Sat.Sep 30, 2023

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang’s internal operations. Today, we’ll take a closer look at the history of Snatch, its alleged founder, and their claims that everyone has confused them with a different, older ransomware group by the same name.

article thumbnail

Cloudflare DDoS protections ironically bypassed using Cloudflare

Bleeping Computer

Cloudflare's Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security controls. [.

DDOS 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting the same victims, at least since July 2023. "During these attacks, cyber threat actors deployed two different ransomware variants against victim companies from the following variants: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal," the FBI said in an alert.

article thumbnail

FBI warns of dual ransomware attacks

Security Affairs

The U.S. Federal Bureau of Investigation (FBI) warns of dual ransomware attacks aimed at the same victims. The U.S. Federal Bureau of Investigation (FBI) is warning of dual ransomware attacks, a new worrisome trend in the threat landscape that sees threat actors targeting the same victims two times. “As of July 2023, the FBI noted two trends emerging across the ransomware environment and is releasing this notification for industry awareness.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Microsoft fixes Outlook prompts to reopen closed windows

Bleeping Computer

Microsoft has resolved a known issue that caused Outlook Desktop to unexpectedly prompt users to reopen previously closed windows. [.

122
122
article thumbnail

ALPHV/BlackCat ransomware gang hacked the hotel chain Motel One

Security Affairs

The ALPHV/BlackCat ransomware gang added the hotel chain Motel One to the list of victims on its Tor leak site. Motel One is a German hotel chain that offers budget-friendly accommodations primarily targeted at business and leisure travelers. It is known for its stylish and design-focused hotels that aim to provide a comfortable and affordable stay for guests.

More Trending

article thumbnail

Progress Software fixed two critical severity flaws in WS_FTP Server

Security Affairs

Progress Software has addressed a critical severity vulnerability in its WS_FTP Server software used by thousands of IT teams worldwide. Progress Software warned customers to address a critical severity vulnerability, tracked as CVE-2023-40044 (CVSS score 10), in its WS_FTP Server software which is used by thousands of IT teams worldwide. “The WS_FTP team recently discovered vulnerabilities in the WS_FTP Server Ad hoc Transfer Module and in the WS_FTP Server manager interface.

Software 104
article thumbnail

Chinese Hackers Are Hiding in Routers in the US and Japan

WIRED Threat Level

Plus: Stolen US State Department emails, $20 million zero-day flaws, and controversy over the EU’s message-scanning law.

Hacking 112
article thumbnail

A Closer Look at the Snatch Data Ransom Group

Security Boulevard

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang's internal operations. Today, we'll take a closer look at the history of Snatch, its alleged founder, and their claims that everyone has confused them with a different, older ransomware group by the same name.

article thumbnail

Apple, Microsoft, and Google Just Fixed Multiple Zero-Day Flaws

WIRED Threat Level

Plus: Mozilla patches 10 Firefox bugs, Cisco fixes a vulnerability with a rare maximum severity score, and SAP releases updates to stamp out three highly critical flaws.

Hacking 81
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs

Security Boulevard

Welcome to the 11th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API10:2023 Unsafe Consumption of APIs. In this series we are taking an in-depth look at each category – the details, the impact and what you [.] The post 2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs appeared first on Wallarm.

62
article thumbnail

Child abuse site taken down, organized child exploitation crime suspected – exclusive

Security Affairs

A child abuse site has been taken down following a request to German law enforcement by Cybernews research team. A hacker collective, who wanted to remain anonymous, has been relentlessly hunting online crooks who benefit from videos of children being abused. This week, they discovered a website dedicated to pedophiles – it was full of explicit video material featuring minors.

Hacking 105
article thumbnail

Avoid libwebp Electron Woes On macOS With positron

Security Boulevard

If you’ve got ? on this blog (directly, or via syndication) you’d have to have been living under a rock to not know about the libwebp supply chain disaster. An unfortunate casualty of inept programming just happened to be any app in the Electron ecosystem that doesn’t undergo bleeding-edge updates. Former cow-orker Tom Sellers (one. Continue reading → The post Avoid libwebp Electron Woes On macOS With positron appeared first on Security Boulevard.

article thumbnail

DEF CON 31 – Lorenzo Cococcia ‘s ‘War Stories – Finding Foes And Yourself With Latency Trilateration’

Security Boulevard

Many thanks to DEF CON 31 for publishing their presenter’s tremendous DefCon Conference 31 Presenters Content at Caesars Forum, Fllamingo, Harrah’s and Linq in Las Vegas, Nevada via the organizations YouTube channel. Permalink The post DEF CON 31 – Lorenzo Cococcia ‘s ‘War Stories – Finding Foes And Yourself With Latency Trilateration’ appeared first on Security Boulevard.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Discover Endpoint VPN in 2023: Unlocking Secure Remote Access

Security Boulevard

Introduction Introduction In today’s interconnected world, the need for secure remote access to networks and data has never been more crucial. As we navigate the complexities of remote work, especially in the ever-evolving landscape of 2023, understanding the role of Endpoint VPNs becomes indispensable. As depicted in the infographic, Endpoint VPNs serve as the shield … Discover Endpoint VPN in 2023: Unlocking Secure Remote Access Read More » The post Discover Endpoint VPN in 2023: Unlocking Sec

VPN 70