article thumbnail

Who is the Network Access Broker ‘Wazawaka?’

Krebs on Security

Wazawaka used multiple email addresses and nicknames on several Russian crime forums, but data collected by cybersecurity firm Constella Intelligence show that Wazawaka’s alter egos always used one of three fairly unique passwords: 2k3x8x57 , 2k3X8X57 , and 00virtual. ” WHO IS WAZAWAKA? Matveyev , in Abakan, Khakassia.

DDOS 273
article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

I had assumed that they either stole or spoofed a SolarWinds digital certificate, which they then used to authenticate the tainted update. This level of granular scrutiny, oriented to flushing out coding that shouldn’t be there, can be done thanks to advances in data collection and data analytics.

Software 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mystic Stealer

Security Boulevard

In addition, it collects Steam and Telegram credentials as well as data related to installed cryptocurrency wallets. The malware targets more than 70 web browser extensions for cryptocurrency theft and uses the same functionality to target two-factor authentication (2FA) applications. me/+ZjiasReCKmo2N2Rk (Mystic Stealer News).

article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

Founded in 2010 by veteran SaaS and DevOps industry leaders, Datadog specializes in optimizing the service-oriented architecture, helping organizations monitor user journeys and explore service relationships. Reviews highlight ease of deployment, component and service delivery monitoring, and flexibility with customization.

Marketing 117
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Beyond Identity Identity management 2020 Private Expel Managed security service 2016 Private Tigera Zero trust for K8s 2016 Private Intrinsic Application security 2016 Acquired: VMware HackerOne Penetration testing 2015 Private Virtru Data encryption 2014 Private Cloudflare Cloud infrastructure 2010 NYSE: NET.