#cybersecurity-threats

[ follow ]
#ransomware

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

Threat actors are exploiting a patched vulnerability in Veeam Backup & Replication to deploy Akira and Fog ransomware, necessitating immediate security improvements.

Ransomware is driving an increase in emergency patient care

Ransomware attacks on health care are increasing sharply, posing significant risks to patient care and safety.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

Threat actors are exploiting a patched vulnerability in Veeam Backup & Replication to deploy Akira and Fog ransomware, necessitating immediate security improvements.

Ransomware is driving an increase in emergency patient care

Ransomware attacks on health care are increasing sharply, posing significant risks to patient care and safety.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.
moreransomware

Research uncovers new attack method, security leaders share insights

The ConfusedPilot attack may manipulate RAG AI systems, resulting in misinformation and impaired decision-making processes for organizations.
#malware

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Linux servers are targeted by stealthy malware perfctl, primarily for cryptocurrency mining and proxyjacking.

Researchers Create AI-Powered Malware That Spreads on Its Own

AI-powered worm developed by researchers can spread between computers using generative AI.
Researchers warn of potential cybersecurity threats posed by AI-powered malware.

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Linux servers are targeted by stealthy malware perfctl, primarily for cryptocurrency mining and proxyjacking.

Researchers Create AI-Powered Malware That Spreads on Its Own

AI-powered worm developed by researchers can spread between computers using generative AI.
Researchers warn of potential cybersecurity threats posed by AI-powered malware.
moremalware

Modernizing patch management in an evolving IT security landscape

The IT security landscape is increasingly complex, necessitating robust patch management to mitigate risks from third-party applications and dispersed endpoints.

A deepfake caller pretending to be a Ukrainian official almost tricked a US Senator

Deepfake technology poses significant risks to political communication, exemplified by a security incident involving Sen. Cardin and a fake Ukrainian official.

Iranian hackers sent information stolen from Trump campaign to Biden campaign, FBI says

Iranian hackers attempted to interfere in the 2024 election by sending unsolicited emails to Biden's campaign with stolen information from Trump's campaign.
#critical-infrastructure

Easterly: Potential Chinese cyberattack could unfold like CrowdStrike error

The faulty CrowdStrike Falcon update provided insights into potential Chinese cyber operations on sensitive U.S. networks.

NCSC updates warning over hacktivist threat to CNI | Computer Weekly

Russia-backed hacktivist groups targeting critical infrastructure with unsophisticated attacks.
NCSC and CISA warning about evolving threats from hacktivist groups not officially backed by the Kremlin.

Easterly: Potential Chinese cyberattack could unfold like CrowdStrike error

The faulty CrowdStrike Falcon update provided insights into potential Chinese cyber operations on sensitive U.S. networks.

NCSC updates warning over hacktivist threat to CNI | Computer Weekly

Russia-backed hacktivist groups targeting critical infrastructure with unsophisticated attacks.
NCSC and CISA warning about evolving threats from hacktivist groups not officially backed by the Kremlin.
morecritical-infrastructure

Hackers could spy on cellphone users by abusing 5G baseband flaws, researchers say | TechCrunch

Researchers discovered security flaws in 5G basebands, enabling silent attacks like spying and phishing, even downgrading victims to older protocols for easier eavesdropping.

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

A threat actor exploited a vulnerability in Proofpoint's email routing, sending millions of spoofed emails to deceive and steal from recipients.

U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

Ransomware attacks against U.S. healthcare funded North Korea's illicit activities.

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

CISOs are increasingly dealing with people-centric threats and are turning to AI to address vulnerabilities.

A Wider View on TunnelVision and VPN Advice

VPN benefits oversold; mainly useful for rerouting network connections, not encryption. TunnelVision exposes VPN limitations in protecting against local network threats.

How AI is turbocharging security issues

AI is empowering cybercriminals and making cybersecurity threats more sophisticated and widespread.

US warns of North Korean hackers using email security flaws for phishing attacks

North Korean hacking group Kimsuky exploits email security flaws for phishing attacks on organizations.
Proper configuration of email security protocols, such as DMARC, is crucial in preventing phishing attempts and spoofing.

6 Ways Remote Workers Can Stop Their Boss Spying on Them

Remote work has privacy risks due to cybersecurity threats and employer monitoring, requiring tools for staying secure online.

Stealthy malware: The threats hiding in plain sight

Criminals are evolving to use more sophisticated methods like hunter-killer malware to hide from security systems, with over two-thirds of malware now employing stealth techniques.

Prompt Hacking, Private GPTs and Zero-Day Exploits: The Impacts of AI on Cyber Security Landscape

AI accessibility leads to a surge in prompt hacking attempts and misuse of private GPT models for malicious purposes.

France Bracing for Cyberattacks During Summer Olympics

The Summer Olympics in Paris face cybersecurity threats from adversarial countries, criminals, and hacktivists.
Russian-aligned hacktivists and state actors are potential cyberattack threats to the Paris Olympics.

Sunak says UK more robust' on China than most allies

The UK's approach to China is robust compared to allies
Criticism towards UK's handling of Chinese-owned companies like Bytedance
#data-theft

Google's Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

Commercial surveillance vendors sell surveillance services to governments for monitoring or spying purposes.
CSVs openly operate with websites, marketing content, and sales teams, and may change names to avoid scrutiny.

GitHub struggles to keep up with automated malicious forks

Malware campaign started in PyPI spread to GitHub infecting 100,000 repositories.
Attackers upload altered files to GitHub, cloning legitimate repos to spread malware loaders.

Google's Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

Commercial surveillance vendors sell surveillance services to governments for monitoring or spying purposes.
CSVs openly operate with websites, marketing content, and sales teams, and may change names to avoid scrutiny.

GitHub struggles to keep up with automated malicious forks

Malware campaign started in PyPI spread to GitHub infecting 100,000 repositories.
Attackers upload altered files to GitHub, cloning legitimate repos to spread malware loaders.
moredata-theft

Huge cybersecurity leak lifts lid on world of China's hackers for hire

Chinese cybersecurity firm data leak reveals state security agents harvesting data on targets, hackers gather information for clients.
Leaked files from I-Soon provide insights into China's hackers for hire, including targeting Nato, UK Foreign Office, and other institutions.

Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats

The National Cyber Security Centre (NCSC) in the UK has launched the Cyber League, a collective of industry experts who will work alongside the government agency to tackle cybersecurity threats.
The Cyber League will support existing NCSC initiatives by facilitating knowledge sharing and exchanging insights on the growing threat landscape.
Membership to the Cyber League is open to individuals involved in cybersecurity or threat intelligence with a substantial UK connection.

Why Akira could be the next big thing in ransomware

Akira ransomware is a significant threat in the cybersecurity landscape.

How trust and safety leaders at top tech companies are approaching the security threat of AI: 'Trust but verify'

Safety officers advise 'trust, but verify' when integrating AI like ChatGPT into businesses.

Elastic Automates SIEM Investigations with Tines

Automated workflow enhances threat identification and response.
[ Load more ]