Warez users fell for Certishell
Avast – Research of this malware family began when I found a malicious task starting powershell code directly from a registry key within our user base. I wasn’t expecting the
Cyber Resiliency Begins with People and Process, Not Technology
Over the past two years, COVID-19 has changed the way businesses operate and businesses have changed the way they leverage technology. But we’re not even close to finished yet. Expect
FBI warning: Ransomware gangs are going after this lucrative but unexpected target
Businesses in farming and agriculture have been warned that they should be prepared to face an increase in ransomware attacks at critical – like spring planting or harvest. The alert
The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says
The US Federal Bureau of Investigation (FBI) has recently issued a warning to organizations in the Food and Agriculture (FA) sector that ransomware gangs may be more inclined to target
Beanstalk DeFi project robbed of $182 million in flash loan attack
Decentralized finance (DeFi) project Beanstalk has lost $182 million in a flash loan attack. It might seem more like a corporate heist than a typical cyberattack. Still, this security incident
TeamTNT targeting AWS, Alibaba
Written by Darin Smith Summary TeamTNT modified their scripts after they were made public by security researchers TeamTNT scripts primarily target AWS, but can also run in on-premise, container, or
Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for
LinkedIn users are being urged to watch out for suspicious emails because the professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.
Hive hackers are exploiting Microsoft Exchange Servers in ransomware spree
The Hive threat group is targeting vulnerable Microsoft Exchange Servers to deploy ransomware. First spotted in June 2021, Hive is a Ransomware-as-a-Service (RaaS) model in which cyberattackers can utilize the
Microsoft Exchange Servers Targeted by Hive Ransomware
A Hive ransomware affiliate has been deploying multiple backdoors, including the Cobalt Strike beacon, on Microsoft Exchange servers that are vulnerable to ProxyShell security issues. As explained by my colleague,
Authentication vs. Authorization: the Difference Explained
Authentication and authorization are two concepts of access management that make for the perfect combo when speaking of ensuring a thorough cybersecurity strategy for a company. Read on to gain
REvil’s TOR Sites Are Back With New Ransomware
Discovered in April 2019, the REvil/Sodinokibi ransomware (AKA Sodin) is a highly evasive ransomware that encrypts files and deletes the ransom request message after infection. The message informs the victim
Warrior Trading forced to pay $3 million for 'misleading' day trading scheme
The US Federal Trade Commission (FTC) has fined Warrior Trading $3 million for operating day trading programs considered “misleading” to consumers. On April 19, the US regulator said Warrior Trading,
Two-Thirds of Global Banks Report Surge in Destructive Attacks
Russia is seen as biggest threat, according to VMware reportRead More: https://www.infosecurity-magazine.com/news/global-banks-surge-destructive/
Google: Record Year for Zero Days in 2021
Figures were elevated due to more detections and disclosuresRead More: https://www.infosecurity-magazine.com/news/google-record-year-for-zero-days/
Five Eyes Agencies Issue Detailed Russian Cyber-Threat Warning
Alert lists cybercrime and state-backed groups’ TTPsRead More: https://www.infosecurity-magazine.com/news/five-eyes-agencies-russian/
What is a VPN and what does data logging by a VPN means?
A virtual private network or simply VPN is a service that protects your privacy online. This article explains the concept of VPN and the vest VPNs with the No Claims
Why Uploading Your Personal Data on Social Media is a Bad Idea
Did you know almost every social media collects your personal data and sell it to third-party advertisers and even government security agencies? In the early days, social media was meant
Austrac outlines how to spot ransomware and detect abuse of digital currencies
Australia’s financial intelligence and regulatory body Austrac has released two financial crime guides to help businesses detect and prevent criminal abuse of digital currencies and ransomware. Each guide offers practical
Five Eyes advisory warns more malicious Russian cyber activity incoming
Image: Shutterstock Eight cybersecurity authorities from the Five Eye nations have come together to release a joint cybersecurity advisory that more malicious cyber activity is on the way as Russia’s
FBI warns agricultural sector of heightened risk of ransomware attacks
Written by Suzanne Smalley Apr 20, 2022 | CYBERSCOOP The FBI on Wednesday alerted food and agriculture companies to be prepared for ransomware operatives to potentially attack agricultural entities during
Best ethical hacking certification (2022)
Hacking isn’t necessarily about just having an in-depth knowledge of code: It’s about enjoying a challenge and problem-solving. While understanding the bare bones of computing, specific programming languages, risk analysis,
Breaches by the numbers: Why adapting to regional challenges is imperative
Every year, Forrester delivers the Forrester Analytics Business Technographics® Security Survey, which gives us insight into the current state, challenges, and forward-looking priorities of security decision-makers. This year, we analyzed
Best cybersecurity certifications (2022)
Hardly a week goes by when we don’t hear of a data breach, an exposed AWS bucket owned by a company that has been leaking the records of millions of
Beware of Fake Windows 11 Update Delivering Malware
According to researchers, the fake upgrade injects malware onto Windows-based devices and steals crypto wallets and browsing data. CloudSEK security researchers have discovered a fake Windows 11 update website that
How to give Safari a privacy boost with DuckDuckGo Privacy Essentials
In this day and age, you should be doing everything in your power to boost the security and privacy of your browsing efforts. If you don’t, you’re being tracked, logged,
Cyber-Attackers Hit Sunwing Airlines
Thousands of passengers of Canadian low-cost airline face delays after third-party system was hackedRead More: https://www.infosecurity-magazine.com/news/cyberattackers-hit-sunwing-airlines/
Most Email Security Approaches Fail to Block Common Threats
A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs. On overwhelming number of security teams believe their
US Government: North Korean Threat Actors Are Targeting Cryptocurrency Organizations
Joint advisory reveals Lazarus APT is targeting cryptocurrency organizations using trojanized applicationsRead More: https://www.infosecurity-magazine.com/news/us-government-north-korea/
Brokers' sales of U.S. military personnel data overseas stir national security fears
Written by Suzanne Smalley Apr 20, 2022 | CYBERSCOOP The multibillion-dollar data brokerage industry is virtually unregulated and poses a grave national security threat by advertising and selling information it
How to Choose the Right Web Development Firm for Your Startup?
Finding the right website development firm or team is a challenging task for many startups. Business owners see the diversity of service providers and are at a loss of what
Cybersecurity Audit? Ensure Your NIST Compliance
In modern cybersecurity, standards and acronyms are abundant: ISO 27001, CIST, COBIT, GDPR… In the US, National Institute of Standards and Technology (NIST) standards are the go-to for organizations wanting
Emotet Botnet Grows in Size and Activity
Known as a banking Trojan, Emotet is a kind of malware that belongs to the banking Trojans malware strain. Malspam, which are spam emails that contain malware, is the primary
The Emotet Botnet Grows in Size and Activity
Known as a banking Trojan, Emotet is a kind of malware that belongs to the banking Trojans malware strain. Malspam, which are spam emails that contain malware, is the primary
Mars Stealer malware analysis
Mars Stealer is the latest variant of Oski Stealer. This info stealer can gather data from the most popular web browsers, including 2FA plugins and multiple cryptocurrency extensions and wallets.
FBI Releases AvosLocker Ransomware Advisory
Security Intelligence – FBI Releases AvosLocker Ransomware Advisory On March 17, the FBI, the U.S. Treasury Financial Crimes Enforcement Network and the Department of the Treasury released a joint cybersecurity
LAZARUS APT Using TraderTraitor Malware to Target Blockchain Orgs, Users
Lazarus APT group is backed by the North Korean government and is currently targeting organizations and unsuspecting users in the cryptocurrency and blockchain industry with trojanized crypto applications. The Federal
Google: 2021 was a Banner Year for Exploited 0-Day Bugs
Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes. Google Project Zero reported 58 exploited zero-day vulnerabilities in 2021, a record in the short time the
Time to get patching: Oracle's quarterly Critical Patch Update arrives with 520 fixes
Enterprise software giant Oracle has released its April Critical Patch Update (CPU) advisory, which includes 520 fixes for security flaws. Critical Patch Updates are collections of security fixes for Oracle
Google: We're spotting more zero-day bugs than ever. But hackers still have it too easy
Of the 58 zero-day exploits in popular software that Google’s Project Zero tracked in 2021, only two were particularly novel, while the rest relied on the same techniques over and
SDN Security—What is it and Why Should SMBs Care?
Small and mid-sized businesses (SBMs) have every reason to be interested in deploying software-defined networking (SDN) technology, because it offers capabilities such as dynamic, efficient network configuration that can enhance network
All You Need to Know About Protecting Your Intellectual Property on the Internet
Intellectual Property is a type of property that refers to works of the creative mind that are protected by the law. There are many different categories of intellectual property, and some
Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities
Researchers have recently identified three Lenovo UEFI firmware vulnerabilities of high impact located in various Lenovo laptop models that consumers use. By successfully exploiting these flaws, threat actors can deploy
XDR vs EDR – A Comparison
Cyberthreats can compromise any device, including a smartphone, tablet, or laptop. Endpoint security seeks to protect every endpoint that connects to a network in order to prevent unauthorized access and
UK Government Staff Hit with Billions of Malicious Emails in 2021
Only 0.32% of messages were opened on average Read More: https://www.infosecurity-magazine.com/news/uk-government-billions-phishing/
Okta: Just Two Customers Impacted by Lapsus Breach
Authentication vendor completes investigation into incidentRead More: https://www.infosecurity-magazine.com/news/okta-just-two-customers-lapsus/
Global Dwell Time Drops but EMEA Lags
Most intrusions in the region also reported by third partiesRead More: https://www.infosecurity-magazine.com/news/global-dwell-time-drops-emea-lags/
Ransomware: This gang is getting a lot quicker at encrypting networks
A highly successful and aggressive ransomware gang is getting even faster at encrypting networks as they look to extort ransom payments from as many victims as possible. Researchers at
Brave introduces feature to bypass 'harmful' Google AMP pages
Chromium-based browser maker Brave has introduced a new feature called De-AMP which allows users to bypass Google’s Accelerated Mobile Pages framework (AMP) to allow them to instead visit websites directly.