Mon.Apr 18, 2022

article thumbnail

Conti’s Ransomware Toll on the Healthcare Industry

Krebs on Security

Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under its earlier name, “ Ryuk.” On April 13, Microsoft said it executed a legal sneak atta

article thumbnail

Over 42 million people in the UK had financial data compromised

Tech Republic Security

International law firm RPC found the rate of ransomware attacks are spiking, leading to more sensitive information being jeopardized. The post Over 42 million people in the UK had financial data compromised appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to recover files encrypted by Yanlouwang

SecureList

Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter team as they were investigating an incident on a large corporate network. Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this ransomware with recovering their files. Yanluowang description.

article thumbnail

US critical infrastructures targeted by complex malware

Tech Republic Security

A recently discovered set of malicious tools allows state-sponsored attackers to target critical infrastructures in the US. See what you should do to protect yourself from this new threat. The post US critical infrastructures targeted by complex malware appeared first on TechRepublic.

Malware 168
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

CISA adds VMware, Chrome flaws to its Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA adds a VMware privilege escalation flaw and a Google Chrome type confusion issue to its Known Exploited Vulnerabilities Catalog. The Cybersecurity and Infrastructure Security Agency (CISA) added a VMware privilege escalation flaw (CVE-2022-22960) and a Google Chrome type confusion issue (CVE-2022-1364) to its Known Exploited Vulnerabilities Catalog.

article thumbnail

Report: Many SMBs wouldn’t survive a ransomware attack

Tech Republic Security

Some 75% of SMBs polled in a CyberCatch survey said they’d be able to survive only three to seven days following a ransomware attack. The post Report: Many SMBs wouldn’t survive a ransomware attack appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

How businesses are reassessing their mobile strategies

Tech Republic Security

Samsung and Oxford Economics study explores how BYOD vs EPD policies can impact SMBs. The post How businesses are reassessing their mobile strategies appeared first on TechRepublic.

Mobile 159
article thumbnail

How to recover files encrypted by Yanluowang

SecureList

Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter team as they were investigating an incident on a large corporate network. Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this ransomware with recovering their files. Yanluowang description.

article thumbnail

How Hackers Use Reconnaissance – and How to Protect Against It

eSecurity Planet

Information gathering is often the starting point of a cyberattack. For many hackers, before attempting anything they want to know who they’re dealing with, what vulnerabilities they might exploit, and whether they can operate stealthily or not. During such reconnaissance operations, attackers collect relevant data about their victims, but it’s not without risks for them.

article thumbnail

Why you shouldn’t automate your VirusTotal uploads

Malwarebytes

It is important to realize that uploading certain files to VirusTotal may result in leaking confidential data, which could result in a breach of confidentiality, or worse. We have warned against uploading personal information, as does VirusTotal itself on their home page. But apparently some organizations have automated the uploading of email attachments without really thinking through the possible consequences.

Malware 143
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Malware is seen sending extortion emails to pay $2K in Bitcoins

CyberSecurity Insiders

A malware dubbed MyloBot malware is seen sending extortion emails to victims and demanding a payment of $2,732 in digital currency. Interestingly, this malicious software has the potential to stay concealed for 14 days and then contacts the command-and-control server to execute malevolent binaries directly from memory. This malware that was first detected in 2018 has anti-debugging capabilities and the potential to remove other malware already installed in the system or network.

Malware 135
article thumbnail

Experts spotted Industrial Spy, a new stolen data marketplace

Security Affairs

A new marketplace named Industrial Spy that focuses on the sale of stolen data appeared in the threat landscape. Malware HunterTeam and Bleeping Computer reported the born of a new marketplace called Industrial Spy that sells stolen data and offers free stolen data to its members. MalwareHunterTeam researchers spotted malware samples [ 1 , 2 ] that drop the following wallpaper that promotes the site.

Adware 134
article thumbnail

Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps

Dark Reading

IT departments must account for the business impact and security risks such applications introduce.

article thumbnail

Apr 10 – Apr 16 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective. Below is the timeline of the events related to the ongoing invasion that occurred in the previous weeks: April 16 – The unceasing action of Anonymous against Russia. This week the Anonymous collective and its affiliates have targeted multiple Russian organizations stealing gigabytes of data.

Hacking 133
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybersecurity Ecosystem Mapping Updates: April 2022

Security Boulevard

Reflection, future plans, and a large set of updates to the original cybersecurity ecosystem mapping. The post Cybersecurity Ecosystem Mapping Updates: April 2022 appeared first on Security Boulevard.

article thumbnail

Industrial Spy, a New Stolen Data Market Is Advertised via Adware and Cracks

Heimadal Security

Cybercriminals have recently launched a marketplace named Industrial Spy, which sells information stolen from compromised organizations while also “spoiling” its customers with stolen data that’s free of charge. Unlike traditional stolen data marketplaces, where data is used to extort enterprises and threaten them with GDPR fines, Industrial Spy promotes itself as a marketplace where organizations […].

Adware 132
article thumbnail

Free decryptor released for Yanluowang ransomware victims

Bleeping Computer

Kaspersky today revealed it found a vulnerability in Yanluowang ransomware's encryption algorithm, which makes it possible to recover files it encrypts. [.].

article thumbnail

IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government

Heimadal Security

A warning about a new wave of social engineering cyberattacks that distribute the IcedID malware and employ Zimbra exploits for sensitive data theft purposes has been recently issued by the Computer Emergency Response Team of Ukraine (CERT-UA). More Information about the IcedID Phishing Attacks According to the agency, the IcedID phishing attacks are linked to […].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

What is Machine Learning?

Security Boulevard

This big data discipline of artificial intelligence gives systems the freedom to automatically gain information. The post What is Machine Learning? appeared first on Gurucul. The post What is Machine Learning? appeared first on Security Boulevard.

article thumbnail

A week in security (April 11 – 17)

Malwarebytes

Last week on Malwarebytes Labs: Credential-stealing malware disguises itself as Telegram, targets social media users Old Play Store apps served notice by upcoming API level changes Denonia cryptominer is first malware to target AWS Lambda Ransomware: March 2022 review Why identity management matters USPS “Your package could not be delivered” text is a smishing scam Apps removed from Google Play for harvesting user data How to password protect a folder Conti ransomware offshoot targets Russian or

Scams 125
article thumbnail

Unofficial Windows 11 upgrade installs info-stealing malware

Bleeping Computer

Hackers are luring unsuspecting users with a fake Windows 11 upgrade that comes with malware that steals browser data and cryptocurrency wallets. [.].

Malware 124
article thumbnail

Explosion of Machine Identities Creating Cybersecurity ‘Debt’

Security Boulevard

Explosion of Machine Identities Creating Cybersecurity ‘Debt’. brooke.crothers. Mon, 04/18/2022 - 16:58. 11 views. The build-up of cybersecurity debt. The expansion of digital initiatives has created an explosion of human and machine identities, often tallying hundreds of thousands per organization. “This has driven a buildup of identity-related cybersecurity ‘debt,’” according to the report from CyberArk based on a survey of 1,750 IT security decision makers.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Critically Underrated: Studying the Data Distribution Service (DDS) Protocol

Trend Micro

Researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

article thumbnail

Is your security organization ripe for a reorg?

CSO Magazine

With more than two decades of enterprise security experience, Daniel Schwalbe has seen both how the profession has changed and how the structure of security teams has evolved. He recounts, for example, how his former security department reported to network operations when he first started there in the late 1990s. Buried deep in IT, he got the sense that “people didn’t want to talk to us.” [ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecur

CSO 113
article thumbnail

How to Evaluate Cloud Service Provider Security (Checklist)

Security Boulevard

Public cloud adoption is rising among companies across all industries. In a recent survey, over half of companies indicated they’re […]. The post How to Evaluate Cloud Service Provider Security (Checklist) appeared first on Sonrai Security. The post How to Evaluate Cloud Service Provider Security (Checklist) appeared first on Security Boulevard.

CISO 111
article thumbnail

Hackers steal $655K after picking MetaMask seed from iCloud backup

Bleeping Computer

MetaMask has published a warning for their iOS users about the seeds of cryptocurrency wallets being stored in Apple's iCloud if app data backup is active. [.].

Backups 104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New SolarMarker Malware Variant Using Updated Techniques to Stay Under the Radar

The Hacker News

Cybersecurity researchers have disclosed a new version of the SolarMarker malware that packs in new improvements with the goal of updating its defense evasion abilities and staying under the radar.

Malware 101
article thumbnail

GitHub repositories compromised by stolen OAuth tokens

CSO Magazine

Salesforce-owned PaaS vendor Heroku and GitHub have both warned that compromised OAuth user tokens were likely used to download private data from organizations using Heroku and continuous integration and testing service Travis CI, according to statements issued late last week. It's unlikely that GitHub itself was compromised, according to the ubiquitous source code repository's blog post , since the OAuth tokens in question aren't stored by GitHub in usable formats, and more likely that they wer

article thumbnail

US warns of Lazarus hackers using malicious cryptocurrency apps

Bleeping Computer

CISA, the FBI, and the US Treasury Department warned today that the North Korean Lazarus hacking group is targeting organizations in the cryptocurrency and blockchain industries with trojanized cryptocurrency applications. [.].

article thumbnail

Github Notifies Victims Whose Private Data Was Accessed Using OAuth Tokens

The Hacker News

GitHub on Monday noted that it had notified all victims of an attack campaign, which involved an unauthorized party downloading private repository contents by taking advantage of third-party OAuth user tokens maintained by Heroku and Travis CI.

99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!