Is Lamb Chop a hacker? Vulnerability coordination and bug bounty platform HackerOne recently disclosed that a former employee at the firm improperly accessed security reports submitted to it for personal gain. "The person anonymously disclosed this vulnerability information outside the HackerOne platform with the goal of claiming additional bounties," a spokesman said. "In under 24 hours, we worked quickly to contain the incident by identifying the then-employee and cutting off access to data.
All Articles (2948)
Accountants may remember this phrase, “Figures do not lie, but liars’ figure.” After questioning some data results, people later were informed that when, the answer given was, “This is what the computer results showed.” As business people, there is a new “Expert” on its way and arguing with it may be useless.
In June 2022, Microsoft released the Microsoft Responsible Ai Standard, v2.[1] Its stated purpose is to “define product development requirements for responsible Ai.” Perhaps surprisingl
In a new tactic in the ransomware business, the LockBit cybercrime group has launched a bug bounty program promising money to people willing to share sensitive data that can be exploited in ransomware attacks. A recent tweet posted by the vx-underground account, which publishes malware samples, says that through the new bounty program, LockBit will pay for personally-identifiable information on “high-profile individuals, web security exploits and more.”
In February 2019, a large container ship sailing for the Port of New York/New Jersey identified a cyber intrusion on board that startled the US Coast Guard. Though the malware attack never controlled the vessel’s movement, authorities concluded that weak defenses exposed critical functions to “significant vulnerabilities.”
A maritime disaster didn’t happen that day, but a warning flare rose over an emerging threat to global trade: cyber piracy able to penetrate on-board technology that’s replac
The cyber insurance market has matured in recent years, but it may fall short when it comes to certain major attacks, says a US government spending watchdog. The US Government Accountability Office (GAO) has called for a federal response to insurance for "catastrophic" cyberattacks on critical infrastructure. A functioning insurance market is essential for businesses, consumers, and, as GAO highlights, for critical infrastructure operators. The GAO, which audits the trillions of dollars the
Gartner’s top eight cybersecurity predictions warn organizations that they need to employ greater resilience to reduce the impact of more severe cyberattacks. Reducing the blast radius of larger, more potentially devastating attacks is key. Implied in the predictions is advice to focus not just on ransomware or any other currently trending type of cyberattack, but to prioritize cybersecurity investments as core to managing risks and see them as investments in the business. By 2025, 60% of or
Activity Summary - Week Ending on 8 July 2022:
- Red Sky Alliance identified 24,005 connections from new IP’s checking in with our Sinkholes
- DigitalOcean hit 103 x
- Analysts identified 1,557 new IP addresses participating in various Botnets
- ShadowPad
- ToddyCat
- Toll Fraud Malware
- Marriott International
- Ukraine, Dark Crystal RAT
- Crema Finance
- Maui Ransomware
Link to full report: IR-22-189-001_weekly189.pdf
A China-linked state-sponsored hacking group named Bronze Starlight was observed deploying various ransomware families to hide the true intent of its attacks. In attacks observed as early as mid-2021, the threat group started using the HUI Loader to drop ransomware such as AtomSilo, LockFile, Night Sky, Pandora, and Rook.
See: https://redskyalliance.org/xindustry/what-keeps-a-cfo-awake-at-night
The short lifespan of each ransomware family, victimology, and the access to tools employed by Chine
News broke on 5 July 2022 that the operators of AstraLocker Ransomware were shutting down in favor of pursuing a new cryptojacking campaign. The group shared decryptors with VirusTotal, and according to BleepingComputer the decryptors worked on test files that were recently encrypted by the ransomware. AstraLocker was born out of the Babuk ransomware family. In the Summer of 2021 Babuk ransomware group’s code was leaked and the similarities between the leaked code and AstraLocker’s code point
Raccoon Stealer, one of the most prolific data stealers in digital history is back and more effective than ever. The re-emergence of the malware, best known for stealing personal information like passwords, files, and biometric data was first spotted by French cybersecurity company Sekoia the last week of June 2022. According to the firm's analysis, the authors of Raccoon Stealer have rewritten the code from scratch and added screenshot capturing and keystroke logging to its list of capabilit
If you were one of the millions of people who watched Netflix's The Tinder Swindler, you may have shaken your head in wonder at how women could be allegedly hoodwinked out of millions of dollars. People fall for these scams for the same reasons that they fall prey to cold-call scam texts claiming that their loved one is in hospital and fees urgently need to be paid: When emotions are involved, rational thinking can go out of the window.
See: https://www.netflix.com/title/81254340
Simon Leviev,
The cyber division of the Federal Bureau of Investigation (FBI) has published a notification, warning US colleges and universities that education and learning qualifications have been marketed for sale on the Dark Web and on online legal marketplaces and sites. The warning targets universities, colleges, and higher education institutions that credentials have been advertised for sale on Dark Web criminal marketplaces. This exposure of sensitive credential and network access information, especia
As witnessed by the violent criminal activity seen during the US 4th of July weekend; criminals appear to flourish on holiday weekends. No difference with criminal hacking. Cyber threat professionals and law enforcement officers are constantly reminding the public and private sector organizations to always remain vigilant and take appropriate precautions to reduce their risk of cyberattacks. Often, malicious threat actors take advantage of holidays and weekends to disrupt the critical network
Activity Summary - Week Ending on 1 July 2022:
- Red Sky Alliance identified 40,622 connections from new IP’s checking in with our Sinkholes
- MS hit 45 x – 2nd week
- Analysts identified 1,801 new IP addresses participating in various Botnets
- DeadLocker
- Symbiote
- Killnet
- СПИСОК_посилань_на_інтерактивні_карти[.]docx
- Apple, Google and theUS FTC
- Guns and California Data Hacks
Link to full report: IR-22-182-001_weekly182.pdf
Summary Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more
If Artificial Intelligence applications (Ai) like Alexa really can convert voices, using less than a minute of recorded voice into real-time speech, it opens the door to dystopian gaslighting to a whole new level. This could be frightening, creepy, disturbing and maybe even criminal. The definition of gaslighting according to Merriam-Webster: psychological manipulation of a person usually over an extended period of time that causes the victim to question the validity of their own thoughts, pe
Our monthly Cyber Threats & Vulnerabilities Report is provided to our Red Sky Alliance Members to consolidate both prominent government and private cyber security reporting which include descriptions (TTPs), indicators of compromise (IoCs) and at times remediation directions.
Link to full report: IR-22-180-001_IntelSummary180.pdf
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the US, Canada, the UK, Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window. "Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation, telcos, pharmaceuticals, cosmetics, plumbing and heating, automobile dealers, undergarments manufacturers, and more," Cybereason said in a repo
Cryptocurrency storage is one of the most important things that investors should consider when joining the burgeoning digital asset market. Most people investing in this space have little to no knowledge of the existing options. Crypto exchanges currently hold the larger share of investors’ capital despite the associated risks, including hacking and regulatory pressures from oversight authorities.
There are two types of crypto wallets; custodial and non-custodial. The former is offered by cen
It has been reported that cyber criminals are sending out millions of phishing emails a day, using extortion and other schemes to steal Bitcoin and other cryptocurrencies from victims. The phishing attacks use a variety of techniques to trick people into transferring sums of Bitcoin, including phony requests for charity donations and Business Email Compromise BEC scams.
See: https://redskyalliance.org/xindustry/what-the-heck-is-bec
According to a report by cybersecurity researchers at Proofpoi