Mon.May 29, 2023

article thumbnail

Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals

Trend Micro

Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu's motives seem to have changed since at least October 2022.

article thumbnail

US Augusta City targeted by BlackByte Ransomware Group

CyberSecurity Insiders

The City of Augusta in the United States has been struggling to regain control of its computer network as hackers spread ransomware, reportedly stealing data and encrypting the database until a ransom is paid. To substantiate their claims, the BlackByte ransomware group, responsible for the incident, has posted 10GB of sample data and threatened to release more if the victim fails to pay the demanded sum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers hold city of Augusta hostage in a ransomware attack

CSO Magazine

BlackByte group has claimed responsibility for a ransomware attack on the city of Augusta in Georgia. The ransomware group has posted 10GB of sample data for free and claimed they have a lot more data available. “We have lots of sensitive data. Many people would like to see that as well as the media. You were given time to connect us but it seems like you are sleepy,” the screenshot shared by security researcher Brett Callow, who is also a threat analyst at Emsisoft.

article thumbnail

New hacking forum leaks data of 478,000 RaidForums members

Bleeping Computer

A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the forum. [.

Hacking 123
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

The Hacker News

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user authentication and seize control of the devices.

article thumbnail

Insider risk management: Where your program resides shapes its focus

CSO Magazine

There’s no getting around it, I am long in the tooth and have been dealing with individuals who break trust within their work environment for more than 30 years, both in government (where we called it counterespionage or counterintelligence) and in the private sector. Today we call programs that help prevent or identify breaches of trust insider risk management (IRM).

Risk 109

More Trending

article thumbnail

New phishing technique poses as a browser-based file archiver

CSO Magazine

A new phishing technique can leverage the “file archiver in browser” exploit to emulate an archiving software in the web browser when a victim visits a.zip domain, according to a security researcher identifying as mr.d0x. The attacker essentially simulates a file archiving software like WinRAR in the browser and masks it under the.zip domain to stage the phishing attack.

Phishing 100
article thumbnail

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan

The Hacker News

Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. "Initially, the attacker targets a router whose WEBUI is open to the public, executes scripts possibly by using vulnerabilities, and finally infects the GobRAT," the JPCERT Coordination Center (JPCERT/CC) said in a report published today.

article thumbnail

The Top Threats to Cloud Infrastructure Security and How to Address Them

Security Boulevard

Cloud computing has become a critical technology for businesses of all sizes. It offers many benefits, including cost savings, scalability, and flexibility. However, the security of cloud infrastructure is still a concern for many organizations. As cloud infrastructure grows in popularity, so do the risks and threats. This blog post will discuss the major cloud […] The post The Top Threats to Cloud Infrastructure Security and How to Address Them appeared first on PeoplActive.

Risk 97
article thumbnail

Flash loan attack on Jimbos Protocol steals over $7.5 million

Bleeping Computer

Jimbos Protocol, an Arbitrum-based DeFi project, has suffered a flash loan attack that resulted in the loss of more than of 4000 ETH tokens, currently valued at over $7,500,000. [.

98
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Cybersecurity news headlines trending on Google

CyberSecurity Insiders

MCNA, also known as Managed Care of North American Dental, has issued a statement on its website regarding a data breach it is currently experiencing, which has compromised the information of over 9 million patients. As the largest government-sponsored health insurance organization, MCNA states that its systems were possibly infiltrated on February 26th, 2023, but the breach was only identified by its IT staff in the first week of March this year.

article thumbnail

New Go-written GobRAT RAT targets Linux Routers in Japan

Security Affairs

A new Golang remote access trojan (RAT), tracked as GobRAT, is targeting Linux routers in Japan, the JPCERT Coordination Center warns. JPCERT/CC is warning of cyberattacks against Linux routers in Japan that have been infected with a new Golang remote access trojan (RAT) called GobRAT. Threat actors are targeting Linux routers with publicly exposed WEBUI to execute malicious scripts to deploy the GobRAT malware. “Initially, the attacker targets a router whose WEBUI is open to the public, e

Malware 94
article thumbnail

New Phishing Kit: File Archivers in the Browser

Heimadal Security

A new phishing kit, “File Archivers in the Browser” abuses ZIP domains. The kit displays bogus WinRAR or Windows File Explorer windows in the browser. The goal is to convince users to launch malicious processes. Google just enabled this month a new feature that allows websites and emails to register ZIP TLD domains. For example, […] The post New Phishing Kit: File Archivers in the Browser appeared first on Heimdal Security Blog.

article thumbnail

Researchers analyzed the PREDATOR spyware and its loader Alien

Security Affairs

Cisco Talos and the Citizen Lab researchers have published a technical analysis of the powerful Android spyware Predator. Security researchers at Cisco Talos and the Citizen Lab have shared technical details about a commercial Android spyware named Predator that is sold by the surveillance firm Intellexa (formerly known as Cytrox). The researchers focused their analysis on two components of the mobile spyware implant, respectively tracked as “ALIEN” and “PREDATOR.” “PREDATOR is an interest

Spyware 94
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

Keep Your Valuable Artwork Safe When Moving It

SecureBlitz

Here, I will show you how to keep your valuable artwork safe when moving it. Due to the high value and delicate nature of artwork and antiques, moving with them may be a difficult experience. Irreplaceable works of art, sculptures, and other collectibles are highly prized by their owners. Any kind of loss or damage […] The post Keep Your Valuable Artwork Safe When Moving It appeared first on SecureBlitz Cybersecurity.

article thumbnail

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Security Affairs

Experts warn of phishing attacks that are combining the use of compromised Microsoft 365 accounts and.rpmsg encrypted emails. Trustwave researchers have observed threat actors using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts in a phishing campaign aimed at stealing Microsoft credentials. RPMSG files are used to deliver e-mails with Rights-Managed Email Object Protocol enabled.

article thumbnail

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

The Hacker News

If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day.

article thumbnail

Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals

Security Affairs

Managed Care of North America (MCNA) Dental disclosed a data breach that impacted more than 8.9 million individuals. Managed Care of North America (MCNA) Dental suffered a data breach that impacted 8,923,662 patients. MCNA Dental is one of the largest US dental care and oral health insurance providers. The security breach exposed the personal information of current or former provider of dental/orthodontic care to members of certain state Medicaid and Children’s Health Insurance Programs, for whi

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks

The Hacker News

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm ESET said it identified over 240,000 detections of the crypter in its telemetry in 2021 and 2022. This amounts to more than 10,000 hits per month.

Malware 86
article thumbnail

Barracuda Networks patches zero-day vulnerability in Email Security Gateway

Malwarebytes

On May 20, Barracuda Networks issued a patch for a zero day vulnerability in its Email Security Gateway (ESG) appliance. The vulnerability existed in a module which initially screens the attachments of incoming emails, and was discovered on May 19. Barracuda's investigation showed that the vulnerability resulted in unauthorized access to a subset of email gateway appliances.

article thumbnail

Protect your business network with PureDome

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at PureDome. Thanks to the great team there for their support! PureDome offers a secure, quick, reliable solution that enhances and safeguards business network security. With seamless deployment, you can effortlessly expand your corporate network without sacrificing performance.

article thumbnail

MCNA Dental data breach impacts 8.9 million people after ransomware attack

Bleeping Computer

Managed Care of North America (MCNA) Dental has published a data breach notification on its website, informing almost 9 million patients that their personal data were compromised. [.

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

Top Cyberattacks Revealed in New Threat Intelligence Report

Dark Reading

New report provides actionable intelligence about attacks, threat actors, and campaigns.

101
101
article thumbnail

Lazarus hackers target Windows IIS web servers for initial access

Bleeping Computer

The notorious North Korean state-backed hackers, known as the Lazarus Group, are now targeting vulnerable Windows Internet Information Services (IIS) web servers to gain initial access to corporate networks. [.

article thumbnail

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security Boulevard

Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They. The post API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods appeared first on Indusface. The post API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods appeared first on Security Boulevard.

Risk 52
article thumbnail

From Data Chaos to Data Mastery How to Build and Scale Data Lakes with AWS Services

Security Boulevard

In today’s data-driven world, organizations are faced with an ever-increasing volume of data from various sources. To extract meaningful insights and drive informed decision-making, it is essential to have a well-structured and scalable data management strategy in place. This is where data lakes, combined with AWS services, come into play. In this blog post, we […] The post From Data Chaos to Data Mastery How to Build and Scale Data Lakes with AWS Services appeared first on PeoplActive.

52
article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.

article thumbnail

How to Secure Your SCM Repositories with GitGuardian Honeytokens

Security Boulevard

Protect your code and secure your repositories with honeytokens. Learn how to create and add these digital traps to your SCM repositories and how GitGuardian helps you stay alert to potential threats. Read on for best practices and tips to make the most out of honeytokens. The post How to Secure Your SCM Repositories with GitGuardian Honeytokens appeared first on Security Boulevard.

52
article thumbnail

United States of America: Memorial Day 2023

Security Boulevard

Photograph Courtesy of the United States Marine Corps , Photographer: Caitlin Brink, CPL, USMC Permalink The post United States of America: Memorial Day 2023 appeared first on Security Boulevard.

52
article thumbnail

Protecting your business: Advice to SMB CEOs from a former CIO

Security Boulevard

The acronym CIO is sometimes understood to stand for “Career Is Over,” and here’s why: Business leaders in charge of information technology are not only tasked with driving automation, productivity, business intelligence, digitization, and cloud platforms, but often also with cybersecurity. The post Protecting your business: Advice to SMB CEOs from a former CIO appeared first on Security Boulevard.