Ransomware-wielding attackers show no signs of stopping, and experts report December 2023 was the second-worst month on record for known victims. Lately, Akira-wielding attackers have been hitting Finland hard, and Medusa has been behind a rising number of attacks.
Financially motivated Turkish hackers are targeting Microsoft SQL servers in the United States, Europe and Latin America in hacking that ultimately ends with deployment of Mimic ransomware or the sale of access to infected hosts on criminal online markets.
Fraudsters have long relied on mule accounts to deposit proceeds from a variety of scams, but financial crimes investigators are seeing a shift to dropped accounts, which can be opened and quickly discarded to evade detection by law enforcement, said M&T Bank's Karen Boyer.
While cybercriminals and advanced persistent threat groups have long abused legitimate internet services both to scale and disguise various types of attacks, a new report warns of a growing challenge posed by the illegitimate use of GitHub and offers essential defenses for users.
Hackers possibly connected to the Chinese government since December have exploited two zero-days in a VPN from software developer Ivanti that is widely used by governments and corporations, and a patch won't be available until later this month.
This week, hackers ran crypto phishing scams on X accounts, the SEC approved bitcoin ETP, hackers stole $3.4 million from Gamma, dYdX detailed post-hack steps, CertiK published 2023 hack stats, TRM Labs discussed North Korean hacking and Apple India blocked users from offshore crypto exchanges.
The ever-expanding threat landscape keeps evolving, and it is easy to overlook key areas that could expose your organization. However, you can stay ahead of constantly evolving threats and gain peace of mind with this comprehensive checklist.
These recommendations, abstracted from the latest 2022 Unit 42 Incident...
Google Cloud's Mandiant says its account at X, formerly Twitter, was hijacked and used to link to cryptocurrency phishing pages after an attacker guessed the account password, apparently after Twitter last year deactivated the account's SMS-based two-factor authentication, leaving it unprotected.
Vulnerability Management is becoming more difficult than ever.
As the attack surface has grown, the security industry has become obsessed with detecting every possible vulnerability. Our ability to address these vulnerabilities hasn’t kept pace with the millions of vulnerabilities from dozens of sources found in...
Merck & Co.'s proposed settlement with insurers over a $1.4 billion claim related to the NotPetya attack will change the language the insurance industry uses to exclude acts of war in its policies, and organizations need to consider how those changes affect risk, said attorney Peter Halprin.
Cybercriminals are extorting some patients and threatening them with swatting in the wake of a recent cyberattack on a Seattle cancer center. The incident, stemming from a Citrix Bleed exploit, has triggered multiple lawsuits and affected the personal data of at least 1 million people.
Criminals have built highly successful business models by hacking into a wide range of organizations at will. University professor John Walker warned that the world is witnessing the unintended consequences of our collective inability to secure assets - kinetic threats to global stability.
A new cryptomining campaign uses a quirkily customized Mirai botnet to spread cryptomining malware designed to hide the digital wallet that collects the ill-gotten gains. Security researchers at Akamai dubbed the Mirai variation NoaBot when it first appeared in early 2023.
The U.S. Securities and Exchange Commission said it is probing the "compromise" of its X - formerly known as Twitter - social media accounts after a hacker broadcast a fake post claiming the agency had approved spot bitcoin exchange-traded funds, which sent the value of bitcoin rocketing.
Attack surfaces have become complex and difficult to manage. With our Attack Surface Management for Dummies® guide, it provides insights into all things attack surface management (ASM), including:
Seven key ASM capabilities and features
Discovering your unknown attack surface
How to prevent common...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.