Qlocker Ransomware Is Apparently Back in Business

Qlocker is a specific ransomware that infiltrates users’ storage devices and operates as a file locker, keeping users out unless they supply a password. The Qlocker ransomware only affects QNAP…

NSW government casual recruiter suffers ransomware hit

IT recruitment firm Finite Recruitment has confirmed it experienced a cyber incident in October, which resulted in a “small subset” of the company’s data being downloaded and published on the…

US and Australia Enter CLOUD Act Agreement

US and Australia Enter CLOUD Act Agreement The United States has entered into an agreement with Australia to share electronic data so as to facilitate the investigation of serious crimes. …

‘Tropic Trooper’ Reemerges to Target Transportation Outfits

Analysts warn that the attack group, now known as ‘Earth Centaur,’ is honing its attacks to go after transportation and government agencies. They’ve been an active threat group since 2011,…

Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas

Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas Online shoppers in the UK will be hit by up to eight million credential stuffing attacks per…

Brazil investigates use of staff credentials in cyberattacks against government bodies

Following major cyberattacks against central government bodies in Brazil, initial investigations have found that malicious actors have used civil servant credentials to access systems. The finding is among a series…

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…

Ransomware Attackers Have ‘Industry Standards’ Too

Security Intelligence – Security Intelligence – Ransomware Attackers Have ‘Industry Standards’ Too Ransomware attackers are creating ‘industry standards’ and using them to define an ideal target for their campaigns. The…

‘DarkWatchman’ RAT Shows Evolution in Fileless Malware

The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access. A novel remote access trojan…

Log4j flaw: This new threat is going to affect cybersecurity for a long time

If there ever was any doubt over the severity of the Log4j vulnerability, director of US cybersecurity and infrastructure agency CISA, Jen Easterly, immediately quashed those doubts when she described…