article thumbnail

Lapsus$ Ransomware Group is hiring, it announced recruitment of insiders

Security Affairs

Their scope of interests include – major telecommunications companies such as Claro, Telefonica and AT&T. ” – said Christian Lees, CTO of Resecurity, Inc, a Los Angeles-based cybersecurity company providing managed threat detection and response.

article thumbnail

Behind the Breach: How CrowdStrike uses Obsidian in Incident Responses

Security Boulevard

Last week, Tim Parisi, the Director of Incident Response for CrowdStrike’s world-class IR services team, published a blog detailing “multiple investigations into an intrusion campaign targeting telecommunications and business process outsourcing (BPO) companies.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware and wiper signed with stolen certificates

SecureList

The threat actors used certificates from Nvidia and Kuwait Telecommunications Company to sign their malware; the former was already leaked, but we’re not sure how they got their hands on the latter. The ransomware – use of Kuwait Telecommunications Company signing certificate. Threat detection.

article thumbnail

Microsoft details new sophisticated spear-phishing attacks from NOBELIUM

Security Affairs

NOBELIUM focuses on government organizations, non-government organizations (NGOs), think tanks, military, IT service providers, health technology and research, and telecommunications providers.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

History of MSSPs As internet service providers (ISPs) and telecommunications companies (telecoms) began offering commercial access to the internet in the late 1990s, they began to also offer firewall appliances and associated managed services. and then monitors the endpoint alerts to respond to detected threats. Outsourcing U.S.

article thumbnail

The people problem: Large businesses shift resources to address risks tied to new and disgruntled employees

SC Magazine

respondent working in the telecommunications industry. Respondents reported specific sources and threats that informed their security strategies, such as attacks from Russia and other nation-states, attacks on supply chains and attacks focused on specific sectors, particularly health care.

Risk 65
article thumbnail

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

Cisco Security

In our last blog , we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. But what if the TSA had some ‘carrot’-based business benefits that are much less discussed? Proactive tech refresh. Prompt disaster recovery. Well-integrated tech.