Fake DarkSide gang targets energy, food industry in extortion emails

Threat actors impersonate the now-defunct DarkSide Ransomware operation in fake extortion emails sent to companies in the energy and food sectors. The Darkside ransomware operation launched in August 2020, targeting corporate networks and demanding millions of dollars for a decryptor and a promise not to release stolen data. After hitting Colonial Pipeline, the largest fuel … Continue reading Fake DarkSide gang targets energy, food industry in extortion emails

Why XDR is Not Enough

By Guy Rosefelt, Security CMO, Sangfor Technologies What is XDR? One of the latest trends in cybersecurity is Extended Detection and Response, more commonly known as XDR. Although originally defined by Palo Alto Networks as a key capability, other security vendors have released some type of XDR functionality and of course all define and approach … Continue reading Why XDR is Not Enough

The return of TA402 Molerats APT after a short pause

TA402 APT group (aka Molerats and GazaHackerTeam) is back after two-month of silence and is targeting governments in the Middle East. The TA402 APT group (aka Molerats and Gaza Cybergang) is back after a two-month of apparent inactivity, it is targeting government institutions in the Middle East and global government entities with interest in the … Continue reading The return of TA402 Molerats APT after a short pause

Data Breaches Surge in Food & Beverage, Other Industries

Data Breaches Surge in Food & Beverage, Other Industries Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows. Though no industry is immune from cyberattacks, a few have traditionally been less affected by them than others. A new study shows … Continue reading Data Breaches Surge in Food & Beverage, Other Industries

‘Oddball’ Malware Blocks Access to Pirated Software

Rather than steal credentials or hold data for ransom, a recent campaign observed by Sophos prevents people from visiting sites that offer illegal downloads. The objective of most malware is some kind of gain — financial or otherwise — for the attackers who use it. However, researchers recently observed a unique malware with a single … Continue reading ‘Oddball’ Malware Blocks Access to Pirated Software

Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Devices have multiple OSs and firmware running, and most organisations don't know what they have or if it's secure. Microsoft will use ReFirm to make it easier to find out without being an expert. Image: Microsoft As operating systems become more secure, attackers are increasingly shifting their attention to firmware, which is less visible, more … Continue reading Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Carnival Cruise Cyber-Torpedoed by Cyberattack

This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware attacks. Carnival Corp., the world’s largest cruise-ship operator, has sprung another leak: For the second time in a year, attackers have breached email accounts and accessed personal, financial and health information belonging to … Continue reading Carnival Cruise Cyber-Torpedoed by Cyberattack

Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg Koshkin was convicted for charges related to the operation of a malware crypting service used by the Kelihos botnet to obfuscate malware and evade detection. “According to court documents and evidence introduced … Continue reading Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Mission Critical: What Really Matters in a Cybersecurity Incident

Mission Critical: What Really Matters in a Cybersecurity Incident The things you do before and during a cybersecurity incident can make or break the success of your response. As a lawyer who figuratively parachutes into dozens of catastrophic cybersecurity incidents a year, I've learned what is truly mission critical during a cybersecurity incident. In leading … Continue reading Mission Critical: What Really Matters in a Cybersecurity Incident

Vigilante malware blocks victims from downloading pirated software

A vigilante developer turns the tables on software pirates by distributing malware that prevents them from accessing pirated software sites in the future. Threat actors commonly use pirated software and fake crack sites to distribute malware to unsuspecting users who think they are downloading the latest game or movie. Malware distributed via these methods is … Continue reading Vigilante malware blocks victims from downloading pirated software