Wed.Dec 04, 2024

article thumbnail

U.S. Offered $10M for Hacker Just Arrested by Russia

Krebs on Security

In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “ Wazawaka ,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies.

article thumbnail

Black Basta ransomware gang hit BT Group

Security Affairs

BT Group (formerly British Telecom)’s Conferencing division shut down some of its servers following a Black Basta ransomware attack. British multinational telecommunications holding company BT Group (formerly British Telecom) announced it has shut down some of its servers following a Black Basta ransomware attack. “We identified an attempt to compromise our BT Conferencing platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?

Tech Republic Security

Datadog's report highlights long-lived credentials as a cloud security Achilles' heel. Discover risks and ways to secure your environment.

Risk 163
article thumbnail

News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget

The Last Watchdog

Cheltenham, England, Dec. 4, 2024 –A majority of senior cybersecurity professionals at the UK’s largest organisations struggle with feelings of helplessness and professional despair, new research by Green Raven Limited indicates. These negative emotions result from practitioners’ anticipation of eventual, inevitable failure to protect their organisation.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA, FBI Issue Guidance for Securing Communications Infrastructure

Tech Republic Security

The caution comes after Chinese-state-affiliated breaches of American telecommunication networks. Organizations with Cisco infrastructure should take particular note.

article thumbnail

A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

WIRED Threat Level

The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone—and it's already turning up victims.

Spyware 145

More Trending

article thumbnail

Veeam addressed critical Service Provider Console (VSPC) bug

Security Affairs

Veeam addressed a critical vulnerability in Service Provider Console (VSPC) that could allow remote attackers to execute arbitrary code. Veeam released security updates for a critical vulnerability, tracked as CVE-2024-42448 (CVSS score of 9.9) impacting Service Provider Console. Successful exploitation of the flaw can potentially lead to remote code execution on vulnerable installs.

Backups 120
article thumbnail

Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown

The Hacker News

Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that's created by criminals for criminal purposes.

article thumbnail

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Trend Micro

Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.

article thumbnail

National Public Data Shuts Down Months After Massive Breach

Security Boulevard

National Public Data, the data broker whose systems were breached and 2.9 billion files holding sensitive data from 170 million this year, has shut down following the attack and after a judge dismissed parent company Jerico Pictures' bankruptcy filing. The post National Public Data Shuts Down Months After Massive Breach appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Crypto’s rising value likely to bring new wave of scams

Malwarebytes

With the value of cryptocurrencies going to the roof, you can expect several attempts to get defrauded if you even show the slightest interest in the topic or not. Since most cybercriminals lack creativity and are notoriously lazy, we expect to see only slight variations of old tricks. So, we figured if we showed you some old examples, you would know what to expect and hopefully that will assist you in avoiding them.

Scams 132
article thumbnail

Russia-Linked Turla Exploits Pakistani Hackers' Servers to Target Afghan and Indian Entities

The Hacker News

The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved infiltrating the command-and-control (C2) servers of a Pakistan-based hacking group named Storm-0156 to conduct its own operations since 2022.

Hacking 132
article thumbnail

Authorities shut down Crimenetwork, the Germany’s largest crime marketplace

Security Affairs

Germany’s largest crime marketplace, Crimenetwork, has been shut down, and an administrator has been arrested. German authorities announced the takedown of Crimenetwork, the largest German-speaking underground marketplace. Since 2012, Crimenetwork facilitated the sale of illegal goods and services, including drugs, forged documents, hacking tools, and stolen data.

article thumbnail

ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan

The Hacker News

The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals and organizations in Japan since June 2024. The aim of the campaign is to deliver backdoors known as NOOPDOOR (aka HiddenFace) and ANEL (aka UPPERCUT), Trend Micro said in a technical analysis.

Phishing 128
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

She Was a Russian Socialite and Influencer. Cops Say She’s a Crypto Laundering Kingpin

WIRED Threat Level

Western authorities say they’ve identified a network that found a new way to clean drug gangs’ dirty cash. WIRED gained exclusive access to the investigation.

128
128
article thumbnail

How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges

The Hacker News

Many organizations struggle with password policies that look strong on paper but fail in practice because they're too rigid to follow, too vague to enforce, or disconnected from real security needs. Some are so tedious and complex that employees post passwords on sticky notes under keyboards, monitors, or desk drawers. Others set rules so loose they may as well not exist.

Passwords 127
article thumbnail

China is Still Inside US Networks — It’s Been SIX Months

Security Boulevard

Hell froze over: FBI and NSA recommend you use strong encryption. The post China is Still Inside US Networks — It’s Been SIX Months appeared first on Security Boulevard.

article thumbnail

CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid Proself, ProjectSend, and CyberPanel to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2024-51378 (CVSS score: 10.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Phone has bad battery life? I changed these 12 settings on my Android for better endurance

Zero Day

There are several ways to improve your Android's battery life, and I've sifted through them all to spotlight the most effective options - plus an obvious bonus.

119
119
article thumbnail

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions

The Hacker News

The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian money laundering networks that were found to facilitate serious and organized crime across the U.K., the Middle East, Russia, and South America.

124
124
article thumbnail

Black Friday Triggers Near 700% Rise in Retail Cyber Scams

SecureWorld News

Darktrace today revealed a surge in retail cyberattacks at the opening of the 2024 holiday shopping season. Analysis from Darktrace's threat intelligence team using data from across the Darktrace customer fleet shows that during Black Friday week (November 25-29), attempted Christmas-themed phishing attacks leapt 327% [1] around the world, while Black Friday themed phishing attacks jumped 692% compared to the beginning of November (4-9) [2] , as bad actors seek to take advantage of consumers and

Retail 97
article thumbnail

7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments

The Hacker News

Are you using the cloud or thinking about transitioning? Undoubtedly, multi-cloud and hybrid environments offer numerous benefits for organizations. However, the cloud's flexibility, scalability, and efficiency come with significant risk — an expanded attack surface.

Risk 119
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Xreal AR glasses just got a major computing upgrade that puts them at the top for me

Zero Day

The company continues to push the limits of the smart glasses form factor, and its latest innovations are available now in the Xreal One Series.

117
117
article thumbnail

Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking

WIRED Threat Level

In a letter to the Department of Defense, senators Ron Wyden and Eric Schmitt are calling for an investigation into fallout from the Salt Typhoon espionage campaign.

Hacking 114
article thumbnail

I tested the new Kindle Scribe for two weeks, and it beat my ReMarkable in several ways

Zero Day

Amazon's new Kindle Scribe lets you mark up and jot down notes on all your favorite e-books, while offering AI to a host of note-taking features.

116
116
article thumbnail

A New Approach to Network Troubleshooting in the Multicloud World

Cisco Security

The Cisco and AWS integration is a radically new approach to ensuring the availability of modern apps today's multicloud, hybrid environments.

114
114
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Veeam Backup & Replication Vulnerabilities Exposed: High-Severity Flaws Put Data at Risk

Penetration Testing

Veeam Software, a prominent provider of backup, recovery, and data management solutions, has released a security update to address multiple vulnerabilities in its Veeam Backup & Replication software. These vulnerabilities... The post Veeam Backup & Replication Vulnerabilities Exposed: High-Severity Flaws Put Data at Risk appeared first on Cybersecurity News.

Backups 113
article thumbnail

Why Technology Interoperability is the Key to a Safer Internet of Things (IoT)

Security Boulevard

With IoT connectivity expanding, organizations across the industry must grapple with the complexities of securing this vast network of internet-connected “things.” The post Why Technology Interoperability is the Key to a Safer Internet of Things (IoT) appeared first on Security Boulevard.

IoT 119
article thumbnail

4 ways the tech we buy is designed to fail, and why you should be furious

Zero Day

From glued-in batteries to software lockouts, you're paying more than ever for gadgets that won't last. Here's why and what can do done about it.

Software 111
article thumbnail

Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says

Security Boulevard

China's growing presence in the global market for LiDAR, a remote sensing technology widely used in defense and commercial system, presents a national security risk for the United States, which already is dealing with intrusions into critical infrastructure networks by China-backed threat groups, according to a reporte. The post Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says appeared first on Security Boulevard.

Risk 113
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.