article thumbnail

Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

Security Affairs

The Sentinel Labs’s analysis revealed that Black Basta ransomware operators develop and maintain their own toolkit, they documented only collaboration with a limited and trusted set of affiliates. The DisableAntiSpyware parameter allows disabling the Windows Defender Antivirus in order to deploy another security solution.

article thumbnail

A Ransomware Group Claims to Have Breached the Foxconn Factory

Hacker Combat

In December 2020, the DoppelPaymer extortion gang exposed documents allegedly stolen from some of its databases in the United States. After a severe ransomware assault has hit them, they devote the necessary time and money to strengthening their cyber security defenses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dutch police arrested the author of Dryad and Rubella Macro Builders

Security Affairs

” Both macro builders allow crooks to easily create malicious Office documents that are usually involved in hacking campaigns as a first-stage loader for other malware. According to Flashpoint , Rubella is not particularly sophisticated, the builder is used to create Microsoft Word or Excel weaponized documents to use in spam email.

Malware 71
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

While security suites and platforms will scan computers, servers, and network switches all day long, not all of them are designed to handle things like fridges and thermostats. And IoT devices often don’t have the firmware to install antivirus software or other protective tools. The vulnerability is documented as CVE-2023-49722.

Hacking 124
article thumbnail

Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits

eSecurity Planet

You can strengthen your cybersecurity defenses by using reliable antivirus software, firewalls, intrusion detection systems, and virtual private networks (VPNs). Other programming languages are also impacted, with patches and documentation changes in the works. are vulnerable.

Firewall 106
article thumbnail

How To Set Up a Firewall in 8 Easy Steps + Best Practices

eSecurity Planet

Gather the necessary equipment, evaluate the network layout, and become familiar with the firewall documentation. Sample firewall rule administration from ManageEngine Need help in creating a firewall policy document? Changes should be documented and audit information stored for regulatory reporting purposes.

article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

This driver supports file system isolation between Windows containers and their host, allowing malicious actors to influence I/O requests such as creating, reading, writing, and deleting files without raising security software’s suspicion. This attack, however, requires administrator privileges and cannot override host system files.

VPN 103