All Articles (1940)

Sort by

12296261478?profile=RESIZE_400x“We’re open for everyone,” announces a brightly colored sign welcoming visitors to the British Library.  But inside the airy building beside London’s St Pancras Station, not everyone can get what they want.  Not since the library was struck by cyber criminals at the end of last month.  The ransomware attack, carried out by a group known for such activity, has knocked out the website of the UK’s national library.  It has also taken down the WiFi, upon which the crowds who come here to work rely. 

12296541079?profile=RESIZE_400xA well-known ransomware group has recently filed a complaint with the US Securities and Exchange Commission (SEC) over the failure of a victim to disclose an alleged data breach resulting from an attack conducted by the cybercrime gang itself. 

The ransomware group known as Alphv and BlackCat claims to have breached the systems of MeridianLink, https://www.meridianlink.com  a California-based company that provides digital lending solutions for financial institutions and consumer data verificatio

12293636675?profile=RESIZE_400xIt is even more diabolical that cyber threat actors target job hunters.  Especially those who are out of work and running behind in their bills.  Recently, a sub-set within the infamous Lazarus Group has established new infrastructure that impersonates skills assessment portals as part of its social engineering campaigns.  Lazarus Group also known by other names such as Guardians of Peace or Whois Team is a legal hacker group made up of an unknown number of individuals run by the government of N

12294379291?profile=RESIZE_400xThe recent increase of artificial intelligence (AI) continues to be a game-changer in many positive ways, even though we are still on the edge of its vast potential.  New and previously unimaginable medical treatments, safer, cleaner and more integrated public transport, more rapid and accurate diagnoses, and environmental breakthroughs are all within the credible promise of AI today.

Both China and Russia have made no secret of their desire to “Win the AI race” with current and pledged investme

12293629454?profile=RESIZE_400xRecently, security researchers have uncovered close to 4,000 unique secrets inside nearly 3,000 PyPI packages https://pypi.org   and says that more than 760 of these secrets were found to be valid.  Overall, the researchers identified 151 individual types of secrets, including AWS, Azure AD, GitHub, Dropbox, and Auth0 keys, credentials for MongoDB, MySQL, and PostgreSQL, and SSH, Coinbase, and Twilio Master credentials.

Valid credentials pose a critical and immediate threat to organizations, as

12291570900?profile=RESIZE_400xProperty and casualty insurance company Travelers (NYSE: TRV), announced on 06 November 2023 that it has agreed to acquire Corvus Insurance Holdings:  www.corvusinsurnce.com  for approximately US$435 million.

Founded in 2017 and headquartered in Boston, MA, Corvus is a cyber insurance managing general underwriter that relies on artificial intelligence for data analysis and for loss prediction and prevention.  The company is known for its middle-market expertise, catering to wholesale broker

12293203699?profile=RESIZE_400xA cyber threat actor group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October 2023 amid a surge in Iranian cyber activity since the onset of the Israel-Hamas war. The attacks have been attributed to a threat actor it tracks under Imperial Kitten, also known as Crimson Sandstorm (previously Curium), TA456, Tortoiseshell, and Yellow Liderc.  The latest findings also detailed instances of strategic web compromises (aka wate

12292775877?profile=RESIZE_400xA new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z.  This incident is a part of a larger malvertising campaign that targets other utilities like Notepad++, Citrix, and VNC Viewer as seen in its infrastructure (domain names) and cloaking templates used to avoid detection.

While malvertising campaigns are known to set up replica sites advertising widely

12291569282?profile=RESIZE_400xA new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection.  GootLoader is a stealthy malware classified as a first-stage downloader designed to attack Windows-based systems.  It is considered an Initial-Access-as-a-Service (IAaaS) tool used within a ransomware-as-a-service (RaaS) criminal business model.  The GootLoader group's introduction of their custom bot into the late stages of their attack chain is an at

12291565495?profile=RESIZE_400xIn addition to our personal and private information being stolen by foreign cyber threat actors, these same criminals can now quickly obtain sensitive information on US military members from data brokers, according to a new Duke University study whose results were recently published.

See:  https://techpolicy.sanford.duke.edu/wp-content/uploads/sites/4/2023/11/Sherman-et-al-2023-Data-Brokers-and-the-Sale-of-Data-on-US-Military-Personnel.pdf

Data brokers collect and aggregate information and then

12291236295?profile=RESIZE_400xRanswomwareWhen researchers responded to an ad to join up with a Ransomware-as-a-Service (RaaS) operation, they wound up in a cybercriminal job interview with one of the most active threat actors in the affiliate business, who turns out to be behind at least five different strains of ransomware.  Meet "farnetwork," who was unmasked after giving over too many specifics to a Group-IB threat researcher pretending to be a potential affiliate for the Nokoyawa ransomware group.  The cybercriminal is a

12291543891?profile=RESIZE_400xChatGPT subscribers who want to learn about OpenAI's custom GPT chatbots can now test some of them.  At its Dev Day event on 06 November 2023, the company revealed that subscribers could create their own ChatGPT chatbots for specific tasks.  Though that option is not yet available, 16 GPTs made by OpenAI are available for users to see how they work.  Interested parties will find a Tech Support Advisor to assist you with tech issues, a Negotiator to help you advocate for yourself, and a Sous Chef

12291239683?profile=RESIZE_400xThe term “Looney Tunables” refers to a vulnerability that exists in the GNU C library, which is a core library in Linux-based systems.  This library has a hand in many foundational operations like file opening and reading, threading, memory allocation, console printing, etc.  The bug was introduced in April of 2021, but the CVE was not posted to NIST until October 3rd, 2023.  The vulnerability was discovered by the Qualys Threat Research Unit in early September of this year.

A buffer overflow vu

12288184889?profile=RESIZE_400xEurope’s commercial ports are top entry points for cocaine flooding in at record rates.  The work of a Dutch hacker, who was hired by drug traffickers to penetrate port IT networks, reveals how this type of smuggling has become easier than ever.  Court records and other documents obtained by reporters reveal how a man in the Netherlands hacked IT systems at the ports of Rotterdam and Antwerp and sold valuable data to aid cocaine traffickers.

With access to the ports’ container management systems

12290650467?profile=RESIZE_400xA South Korean worker was crushed to death by an industrial robot that mistook him for a box of vegetables, local authorities said on 09 November 2023.  The unidentified worker in Goseong succumbed to head and chest injuries last week after he was snatched up by the robot and shoved onto a conveyor belt, police said.  He reportedly worked for the company that installs the robot and was sent to the vegetable plant to make sure the model was operating correctly.[1]

The device involved in the accid

12288087253?profile=RESIZE_400xSocial engineering is the attempt to trick someone into revealing information (e.g., a password) or taking an action that can be used to compromise systems or networks.  Phishing is a form of social engineering where malicious actors lure victims (typically via email) to visit a malicious site or deceive them into providing login credentials.

Malicious actors primarily leverage phishing for:

  • Obtaining login credentials.
  • Malicious actors conduct phishing campaigns to steal login credentials fo

12287731865?profile=RESIZE_400xShares in the troubled office-sharing firm WeWork https://www.wework.com plunged on 01 November 2023, following reports it could file for bankruptcy as early as next week.  Its shares fell by more than 50% in early trade in New York.  The firm was once seen as the future of the office. But it has been plagued by problems, including a disastrous attempt in 2019 to sell shares to the public and the exit of its co-founder.[1]

WeWork Inc. is/was a provider of co-working spaces, including physical an

12289148884?profile=RESIZE_400xAccording to a warning from cyber threat researchers, an Iranian espionage group has been caught using a new malware framework in a recent sequence of cyberattacks.  The Iranian hacking group Scarred Manticore,[1] linked to the country’s Ministry of Intelligence and Security, has been secretly running a digital spy ring across the Mideast.  It has targeted government and large infrastructure companies such as telecom and financial services to steal data.  The group has been linked to the OilRig

12287714671?profile=RESIZE_400xResearch from Cofense has found that user credentials are being targeted by hackers and scammers on a scale never seen before.  Indicators of compromise (IoC), digital evidence of a cyber attack, for credential phishing have increased in Q3 by close to 45% over Q2, the company's report found.

IT Management Solutions - Compared to the Q3 period of 2022, IoCs of credential phishing are up 85% with PDFs being the most common malicious file extension attached to a phishing email.

Do not take the bai

12287149054?profile=RESIZE_400xAccording to cyber threat professionals, every 11 seconds an organization falls victim to a ransomware attack.  In today's interconnected world, cybersecurity looms as an ever-present concern that organizations can no longer afford to sideline. A 48% increase in cyber risk last year should serve as a wake-up call to all business managers.  Whether a business pays hackers a ransom or not, there are significant costs involved which will include items such as digital forensics and data restoration,