article thumbnail

Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week. ” reported a statement from the security company cited by CTWANT.

article thumbnail

Russia-linked APT28 used new malware in a recent phishing campaign

Security Affairs

Ukraine’s CERT (CERT-UA) warned of a new phishing campaign by the APT28 group to deploy previously undocumented malware strains. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group APT28 (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ”).

Phishing 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zoom Security Vulnerability and SOVA Malware Threat to India

CyberSecurity Insiders

Indian Computer Emergency Response Team (CERT) has issued a warning about two cyber threats hitting the sub-continent populace active online. MeitY( Ministry of Electronics and Information Technology) has categorized the severity as ‘Medium’ and asserted that the susceptibility could hit those hosting meetings on Private Cloud.

Malware 106
article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. Cryptolocker and exploit components.

Malware 98
article thumbnail

Ransomware: 8 Things That You Must Know

Joseph Steinberg

Ransomware comes in multiple flavors – sometimes involving far more than just the unauthorized encryption of data. Remember to keep backups disconnected from your computer and network so that if any ransomware (or other malware) gets onto the network it cannot infect the backups.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

Mysterious custom malware used to steal 1.2TB of data from million PCs

Security Affairs

Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials, and cookies. Threat actors used custom malware to steal data from 3.2 NordLocker experts speculate the malware campaign leveraged tainted Adobe Photoshop versions, pirated games, and Windows cracking tools.

Malware 112