Wed.Dec 04, 2024

article thumbnail

U.S. Offered $10M for Hacker Just Arrested by Russia

Krebs on Security

In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “ Wazawaka ,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies.

article thumbnail

Black Basta ransomware gang hit BT Group

Security Affairs

BT Group (formerly British Telecom)’s Conferencing division shut down some of its servers following a Black Basta ransomware attack. British multinational telecommunications holding company BT Group (formerly British Telecom) announced it has shut down some of its servers following a Black Basta ransomware attack. “We identified an attempt to compromise our BT Conferencing platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget

The Last Watchdog

Cheltenham, England, Dec. 4, 2024 –A majority of senior cybersecurity professionals at the UK’s largest organisations struggle with feelings of helplessness and professional despair, new research by Green Raven Limited indicates. These negative emotions result from practitioners’ anticipation of eventual, inevitable failure to protect their organisation.

article thumbnail

Black Friday Triggers Near 700% Rise in Retail Cyber Scams

SecureWorld News

Darktrace today revealed a surge in retail cyberattacks at the opening of the 2024 holiday shopping season. Analysis from Darktrace's threat intelligence team using data from across the Darktrace customer fleet shows that during Black Friday week (November 25-29), attempted Christmas-themed phishing attacks leapt 327% [1] around the world, while Black Friday themed phishing attacks jumped 692% compared to the beginning of November (4-9) [2] , as bad actors seek to take advantage of consumers and

Retail 111
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

National Public Data Shuts Down Months After Massive Breach

Security Boulevard

National Public Data, the data broker whose systems were breached and 2.9 billion files holding sensitive data from 170 million this year, has shut down following the attack and after a judge dismissed parent company Jerico Pictures' bankruptcy filing. The post National Public Data Shuts Down Months After Massive Breach appeared first on Security Boulevard.

article thumbnail

Microsoft Announces Security Update with Windows Resiliency Initiative

eSecurity Planet

Microsoft recently announced that they’re making changes to their Windows operating system to improve security and reliability. The company has introduced the Windows Resiliency Initiative, a comprehensive strategy to address critical vulnerabilities and enhance overall system integrity. These new features will be available to the Windows Insider Program community sometime in early 2025.

LifeWorks

More Trending

article thumbnail

China is Still Inside US Networks — It’s Been SIX Months

Security Boulevard

Hell froze over: FBI and NSA recommend you use strong encryption. The post China is Still Inside US Networks — It’s Been SIX Months appeared first on Security Boulevard.

article thumbnail

Authorities shut down Crimenetwork, the Germany’s largest crime marketplace

Security Affairs

Germany’s largest crime marketplace, Crimenetwork, has been shut down, and an administrator has been arrested. German authorities announced the takedown of Crimenetwork, the largest German-speaking underground marketplace. Since 2012, Crimenetwork facilitated the sale of illegal goods and services, including drugs, forged documents, hacking tools, and stolen data.

article thumbnail

Why Technology Interoperability is the Key to a Safer Internet of Things (IoT)

Security Boulevard

With IoT connectivity expanding, organizations across the industry must grapple with the complexities of securing this vast network of internet-connected “things.” The post Why Technology Interoperability is the Key to a Safer Internet of Things (IoT) appeared first on Security Boulevard.

IoT 119
article thumbnail

Video: Salt Typhoon Hacks Major Telecom Giants Using Malware

eSecurity Planet

In this video, we delve into the world of cybercrime with our feature on the Salt Typhoon incident, where hackers successfully breached major telecommunications companies. With expert commentary and in-depth analysis, this video is essential viewing for anyone interested in cybersecurity, tech news, or protecting their digital privacy. The post Video: Salt Typhoon Hacks Major Telecom Giants Using Malware appeared first on eSecurity Planet.

Hacking 105
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says

Security Boulevard

China's growing presence in the global market for LiDAR, a remote sensing technology widely used in defense and commercial system, presents a national security risk for the United States, which already is dealing with intrusions into critical infrastructure networks by China-backed threat groups, according to a reporte. The post Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says appeared first on Security Boulevard.

Risk 113
article thumbnail

Five Flaws in Lorex 2K Security Cameras Enable Hackers to Take Full Control, PoC Published

Penetration Testing

Rapid7’s latest research reveals a series of critical vulnerabilities in the Lorex 2K Indoor Wi-Fi Security Camera, raising significant concerns for consumer security. The vulnerabilities, identified during the 2024 Pwn2Own... The post Five Flaws in Lorex 2K Security Cameras Enable Hackers to Take Full Control, PoC Published appeared first on Cybersecurity News.

article thumbnail

Kaspersky Security Bulletin 2024. Statistics

SecureList

All statistics in this report come from Kaspersky Security Network (KSN), a global cloud service that receives information from components in our security solutions voluntarily provided by Kaspersky users. Millions of Kaspersky users around the globe assist us in collecting information about malicious activity. The statistics in this report cover the period from November 2023 through October 2024.

Mobile 85
article thumbnail

Cyberattack Compromises Marin City Housing Project, $950,000 in Public Funds Stolen

Penetration Testing

A significant cybersecurity incident has impacted the Golden Gate Village housing project in Marin City, resulting in the theft of $950,000 of public funds allocated for critical renovations. The Marin... The post Cyberattack Compromises Marin City Housing Project, $950,000 in Public Funds Stolen appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business

Thales Cloud Protection & Licensing

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business madhav Thu, 12/05/2024 - 06:03 CISOs have one of the most vital roles in organizations today. It is also one of the most challenging. That’s because, regardless of industry or location, organizational data has become a precious asset. Protecting that asset is a strategic imperative that carries significant and long-lasting consequences.

CISO 62
article thumbnail

CVE-2024-51378 (CVSS 10): Critical CyberPanel Flaw Under Active Attack, CISA Warns

Penetration Testing

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in CyberPanel, an open-source web hosting control panel. This flaw, tracked as CVE-2024-51378, is being actively exploited... The post CVE-2024-51378 (CVSS 10): Critical CyberPanel Flaw Under Active Attack, CISA Warns appeared first on Cybersecurity News.

article thumbnail

Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?

Tech Republic Security

Datadog's report highlights long-lived credentials as a cloud security Achilles' heel. Discover risks and ways to secure your environment.

Risk 165
article thumbnail

A New Approach to Network Troubleshooting in the Multicloud World

Cisco Security

The Cisco and AWS integration is a radically new approach to ensuring the availability of modern apps today's multicloud, hybrid environments.

142
142
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CISA, FBI Issue Guidance for Securing Communications Infrastructure

Tech Republic Security

The caution comes after Chinese-state-affiliated breaches of American telecommunication networks. Organizations with Cisco infrastructure should take particular note.

article thumbnail

Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library

The Hacker News

Cybersecurity researchers are alerting to a software supply chain attack targeting the popular @solana/web3.js npm library that involved pushing two malicious versions capable of harvesting users' private keys with an aim to drain their cryptocurrency wallets. The attack has been detected in versions 1.95.6 and 1.95.7.

article thumbnail

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Trend Micro

Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.

article thumbnail

Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown

The Hacker News

Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that's created by criminals for criminal purposes.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Phone has bad battery life? I changed these 12 settings on my Android for better endurance

Zero Day

There are several ways to improve your Android's battery life, and I've sifted through them all to spotlight the most effective options - plus an obvious bonus.

119
119
article thumbnail

Russia-Linked Turla Exploits Pakistani Hackers' Servers to Target Afghan and Indian Entities

The Hacker News

The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved infiltrating the command-and-control (C2) servers of a Pakistan-based hacking group named Storm-0156 to conduct its own operations since 2022.

Hacking 123
article thumbnail

Xreal AR glasses just got a major computing upgrade that puts them at the top for me

Zero Day

The company continues to push the limits of the smart glasses form factor, and its latest innovations are available now in the Xreal One Series.

118
118
article thumbnail

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions

The Hacker News

The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian money laundering networks that were found to facilitate serious and organized crime across the U.K., the Middle East, Russia, and South America.

117
117
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Crypto’s rising value likely to bring new wave of scams

Malwarebytes

With the value of cryptocurrencies going to the roof, you can expect several attempts to get defrauded if you even show the slightest interest in the topic or not. Since most cybercriminals lack creativity and are notoriously lazy, we expect to see only slight variations of old tricks. So, we figured if we showed you some old examples, you would know what to expect and hopefully that will assist you in avoiding them.

Scams 116
article thumbnail

Veeam Backup & Replication Vulnerabilities Exposed: High-Severity Flaws Put Data at Risk

Penetration Testing

Veeam Software, a prominent provider of backup, recovery, and data management solutions, has released a security update to address multiple vulnerabilities in its Veeam Backup & Replication software. These vulnerabilities... The post Veeam Backup & Replication Vulnerabilities Exposed: High-Severity Flaws Put Data at Risk appeared first on Cybersecurity News.

Backups 116
article thumbnail

I tested the new Kindle Scribe for two weeks, and it beat my ReMarkable in several ways

Zero Day

Amazon's new Kindle Scribe lets you mark up and jot down notes on all your favorite e-books, while offering AI to a host of note-taking features.

116
116
article thumbnail

ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan

The Hacker News

The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals and organizations in Japan since June 2024. The aim of the campaign is to deliver backdoors known as NOOPDOOR (aka HiddenFace) and ANEL (aka UPPERCUT), Trend Micro said in a technical analysis.

Phishing 115
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!