Sat.Jun 03, 2023

article thumbnail

New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal

The Hacker News

An analysis of the Linux variant of a new ransomware strain called BlackSuit has covered significant similarities with another ransomware family called Royal. Trend Micro, which examined an x64 VMware ESXi version targeting Linux machines, said it identified an "extremely high degree of similarity" between Royal and BlackSuit.

article thumbnail

Zyxel shares tips on protecting firewalls from ongoing attacks

Bleeping Computer

Zyxel has published a security advisory containing guidance on protecting firewall and VPN devices from ongoing attacks and detecting signs of exploitation. [.

Firewall 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Is Being Used to ‘Turbocharge’ Scams

WIRED Threat Level

Plus: Amazon’s Ring was ordered to delete algorithms, North Korea’s failed spy satellite, and a rogue drone “attack” isn’t what it seems.

Scams 117
article thumbnail

Online sellers targeted by new information-stealing malware campaign

Bleeping Computer

Online sellers are targeted in a new campaign to push the Vidar information-stealing malware, allowing threat actors to steal credentials for more damaging attacks. [.

Malware 107
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

FTC Slams Amazon with $30.8M Fine for Privacy Violations Involving Alexa and Ring

The Hacker News

The U.S. Federal Trade Commission (FTC) has fined Amazon a cumulative $30.8 million over a series of privacy lapses regarding its Alexa assistant and Ring security cameras. This comprises a $25 million penalty for breaching children's privacy laws by retaining their Alexa voice recordings for indefinite time periods and preventing parents from exercising their deletion rights.

97
article thumbnail

New Linux Ransomware BlackSuit is similar to Royal ransomware

Security Affairs

Experts noticed that the new Linux ransomware BlackSuit has significant similarities with the Royal ransomware family. Royal ransomware is one of the most notable ransomware families of 2022, it made the headlines in early May 2023 with the attack against the IT systems in Dallas, Texas. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars.

More Trending

article thumbnail

Kimsuky APT poses as journalists and broadcast writers in its attacks

Security Affairs

North Korea-linked APT group Kimsuky is posing as journalists to gather intelligence, a joint advisory from NSA and FBI warns. A joint advisory from the FBI, the U.S. Department of State, the National Security Agency (NSA), South Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and the Ministry of Foreign Affairs (MOFA), warns that North-Korea-linked Kimsuky APT group has been impersonating journalists and academics in a spear-phishing campaign aimed at individuals em

article thumbnail

How AI Protects (and Attacks) Your Inbox

WIRED Threat Level

Criminals may use artificial intelligence to scam you. Companies, like Google, are looking for ways AI and machine learning can help prevent phishing.

article thumbnail

Technical Analysis of Bandit Stealer

Security Boulevard

Key Points Bandit is a new information stealer that harvests stored credentials from web browsers, FTP clients, email clients, and targets cryptocurrency wallet applications. The malware sends stolen information to a command and control server via Telegram. Bandit implements numerous methods to detect and evade virtual machines and malware sandboxes.

article thumbnail

Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part One

Security Boulevard

I've decided to share with everyone a recently released YouTube video demonstration in Bulgarian on the topic of OSINT and threat intelligence training. Here's a sample Table of Contents for the OSINT and the Threat Intelligence training in Bulgarian: Кой се интересува от индивидуално или групово обучение в сферата на OSINT анализ и превенция на кибер престъпления и анализ и обработка на кибер атаки известен още като практиката Threat Intelligence?

57
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

BSidesSF 2023 – Sanchay Jaipuriyar – Overwatch: A Serverless Approach To Orchestrating Your Security Automation

Security Boulevard

Our thanks to BSidesSF for publishing their presenter’s superlative BSidesSF 2023 content on the organizations’ YouTube channel. Permalink The post BSidesSF 2023 – Sanchay Jaipuriyar – Overwatch: A Serverless Approach To Orchestrating Your Security Automation appeared first on Security Boulevard.

article thumbnail

Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part Two

Security Boulevard

I've decided to share with everyone a recently released YouTube video demonstration in Bulgarian on the topic of OSINT and threat intelligence training. Here's a sample Table of Contents for the OSINT and the Threat Intelligence training in Bulgarian: Кой се интересува от индивидуално или групово обучение в сферата на OSINT анализ и превенция на кибер престъпления и анализ и обработка на кибер атаки известен още като практиката Threat Intelligence?

52