All Articles (2047)

Sort by

12703987066?profile=RESIZE_400xPolitical strife and natural disasters have stripped millions of people of internet access over the last two weeks, with experts raising particular concern over actions taken by Turkey's government.  This article explores the intentional and unintentiaional sequestering of social media communication.  Last week, the Turkish government shut down access to social media sites in the Kayseri region of the country due to local anti-Syrian immigrant riots. While hundreds of governments have proven the

12737243283?profile=RESIZE_400xDo you recognize "Lyle" who told all of us about the phase of his career in the mid-1990s during which he installed enterprise management software at Air Force bases, then stuck around to drill staff in its use.  When Lyle arrived for one such, he was told that the base was participating in wargames during the week, and that judges of this event might be present at various moments.  As a civilian, he was assured none of this would impact his work.  As he settled in, Lyle noticed a member of the

12705225896?profile=RESIZE_400xA recent US Supreme Court (SCOTUS) ruling has shifted regulatory enforcement from the federal agencies to the judicial system.  On 28 June 2024, the Supreme Court struck down a legal principle known as the Chevron Doctrine (or Deference).  This doctrine dates to a 1984 Supreme Court ruling (Chevron v Natural Resources Defense Council) that allows federal agencies to use their own expertise to interpret ambiguities in the law.  It became the foundation for the federal system of regulation through

12702049279?profile=RESIZE_400xAs cybersecurity providers advance and evolve their service capabilities, they may fall into one of two camps relative to managed detection and response (MDR) or extended detection and response (XDR) technologies or blur the lines by offering both.  What are the similarities and differences between MDR and XDR?  And who are the key players in either space?  If you’re an MSSP, MSP or cybersecurity vendor, it’s important to know.

MDR and XDR are both cybersecurity services designed to enhance thre

12702047296?profile=RESIZE_400xThe National Health Laboratory Service (NHLS) in South Africa has confirmed that its laboratories are operational following a recent cyber-attack, although the automated distribution of test results to clinicians remains disrupted.  In a statement released on Wednesday, the NHLS explained that its systems and infrastructure were compromised by the cyber-attack, affecting the automatic generation and delivery of laboratory reports to clinicians via WebView.  Despite these challenges, urgent test

12703603066?profile=RESIZE_400xTransparent Tribe (aka APT 36, Operation C-Major) has been active since at least 2016 with attacks against Indian government and military personnel.  The group relies heavily on social engineering attacks to deliver a variety of Windows and Android spyware, including spear-phishing and watering hole attacks.

In September 2023, SentinelLabs outlined the CapraTube campaign, which used weaponized Android applications (APK) designed to mimic YouTube, often in a suspected dating context due to the na

12700078078?profile=RESIZE_400xInternational Joint Operation Takes Down Over 600 IP Addresses Abusing Cobalt Strike Tool - Hundreds of IP addresses abusing Cobalt Strike have been shut down in a joint effort involving law enforcement across several nations. Codenamed “Morpheus”, the joint operation resulted in flagging 690 IP addresses and domains used to infiltrate victim networks.  So far, 593 of them have been taken offline.

The servers flagged in Operation Morpheus used old, unlicensed versions of Cobalt Strike, a popular

12702001462?profile=RESIZE_400xLuxury department store chain the Neiman Marcus Group[1] has become the latest victim in a series of cyberattacks targeting users of the Snowflake data warehousing platform. The breach affected nearly 65,000 shoppers and exposed sensitive personal information.

In a letter to affected customers, Neiman Marcus stated, "We are writing to notify you of an issue that involves certain of your personal information.  In May 2024, we learned that, between April and May 2024, an unauthorized third party g

12701398287?profile=RESIZE_400xChatGPT-maker OpenAI was hit by a cyberattack in 2023.  The threat actors were able to access internal discussions among researchers and other employees.  Corporate espionage?  According to media sources, the company had neither publicly disclosed the attack or informed the law enforcement authorities back then.  The breach was only made known among employees back in April 2023 during an internal meeting because its source code and customer data were not compromised. Affected data mostly include

12701959081?profile=RESIZE_400xAI is fueling a lot of wild ideas for our tech-driven future.  If everything pans out, we will not have to write our own essays, take our notes, or drive our cars.   But with AI’s rapid growth, it is hard not to give at least some of those lofty visions credence, even the most sci-fi ones, even Star Wars-level humanoid robots.  There are a lot of humanoid bots now and a lot more seemingly on the way, Figure’s AI robot, Unitree’s speed demon, Agility’s workhorse, but arguably most important of al

12684845272?profile=RESIZE_400xAfter confirming a production-halting cyberattack last month, forklift manufacturer Crown Equipment said on 1 July that operations have resumed.  Crown said work was proceeding at all 24 of its manufacturing plants.  The company’s manufacturing operations had been suspended since 10 June due to the attack on its business systems.

A company spokesman has declined to comment on the attack and said no further information would be available.  The company has declined to answer questions about how ma

12701432895?profile=RESIZE_400xThe United Nations' telecommunication agency condemned Russian interference in the satellite systems of several European countries.  Earlier this month, the UN’s International Telecommunication Union (ITU) received a series of complaints from Ukraine, France, Sweden, the Netherlands and Luxembourg about the Kremlin’s alleged satellite interference that has affected GPS signals and television channels.  The ITU reviewed these complaints and published a document Monday calling the practice “extrem

12676049296?profile=RESIZE_400xMore than 1,000 planned operations and over 3,000 outpatient appointments have been postponed amid ongoing disruption caused by a cyber-attack that impacted London hospitals.  Synnovis, an agency which manages labs for NHS trusts and GPs in south-east London, was the victim of a data hack on 3 June.[1]

New figures from NHS England show that since then, 3,396 appointments and 1,255 elective procedures have been postponed.  In a statement, the chief executives of two affected trusts said they were

12676026299?profile=RESIZE_400xJuly 4th marks the anniversary of when Congress, comprised of delegates from the United States' original 13 colonies, signed the Declaration of Independence on 4 July 1776. The document declared the nation's independence from Great Britain.

Some research indicates that the original signers didn't even write their names on the official document until 2 August 1776.  In fact, it would take six months to acquire all 56 signatures.  Thomas McKean, a delegate from Delaware, was reportedly the last pe

12686776086?profile=RESIZE_400xP2Pinfect is a rust-based malware analyzed extensively by Cado Security in the past.  It is a reasonably sophisticated malware sample that uses a peer-to-peer (P2P) botnet for its command and control mechanism.  Upon initial discovery, the malware mainly appeared dormant.  It would spread primarily via Redis and a limited SSH spreader, but ultimately, it did not seem to have an objective other than to spread.  Recently, we observed a new update to P2Pinfect that introduced ransomware and crypto

12684850059?profile=RESIZE_400xAfter spending five years in detention in London's high-security H M Prison Belmarsh, a Category A men’s prison in Thamesmead, WikiLeaks founder Julian Assange has made a plea deal with the US Government. He will plead guilty to one charge of espionage and return home to Australia after years of fighting extradition from Britain. US authorities have agreed to drop their demand for Assange to be extradited from Britain after reaching a plea deal with the WikiLeaks founder.

In return for pleading

12676007501?profile=RESIZE_400xThe US military recently launched a groundbreaking initiative to strengthen ties with the commercial space industry.  The aim is to integrate commercial equipment into military space operations, including satellites and other hardware. This would enhance cybersecurity for military satellites.  As space becomes more important to the world’s critical infrastructure, the risk increases that hostile nation states will deploy cyber-attacks on important satellites and other space infrastructure.  Targ

12685916258?profile=RESIZE_400xThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding an ongoing phone-based impersonation fraud campaign where scammers are masquerading as CISA staff. In a brief notification, the agency stated it is "aware of recent impersonation scammers claiming to represent the agency."

The CISA warning  https://www.cisa.gov/news-events/alerts/2024/06/12/phone-scammers-impersonating-cisa-employees  explicitly states that its employees "will never contact you with a

12057871866?profile=RESIZE_400x

Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associate

12673816255?profile=RESIZE_400xSpyware is malicious software engineered to covertly monitor and gather information from a user’s computer without their awareness or consent.  It can record activities like keystrokes, browsing behavior, and personal information, often transmitting this data to a third party for espionage or theft.

Researchers at FortiGuard Labs recently detected an attack exploiting the CVE-2021-40444 vulnerability in Microsoft Office.  This flaw allows attackers to execute malicious code via specially crafted