Fake DarkSide gang targets energy, food industry in extortion emails

Threat actors impersonate the now-defunct DarkSide Ransomware operation in fake extortion emails sent to companies in the energy and food sectors. The Darkside ransomware operation launched in August 2020, targeting corporate networks and demanding millions of dollars for a decryptor and a promise not to release stolen data. After hitting Colonial Pipeline, the largest fuel … Continue reading Fake DarkSide gang targets energy, food industry in extortion emails

Insider Versus Outsider: Navigating Top Data Loss Threats

It’s no surprise that cloud adoption has increased considerably in the last year, as organizations sought to adapt to the rapid transition to remote work amid the pandemic. However, what’s shocking is that despite the many advantages cloud and software-as-a-service (SaaS) applications provide organizations, they frequently fall short when it comes to averting data loss. … Continue reading Insider Versus Outsider: Navigating Top Data Loss Threats

Attackers Find New Way to Exploit Google Docs for Phishing

Attackers Find New Way to Exploit Google Docs for Phishing Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content. Researchers spotted what they describe as a new method that attackers appear to be using to lure victims to malicious phishing websites via Google Docs. The attack chain … Continue reading Attackers Find New Way to Exploit Google Docs for Phishing

Poland blames Russia for breach, theft of Polish officials emails

Poland's deputy prime minister Jarosław Kaczyński says last week's breach of multiple Polish officials' private email accounts was carried out from servers within the Russian Federation. "After reading the information provided to me by the Internal Security Agency and the Military Counterintelligence Service, I inform you that the most important Polish officials, ministers, and deputies … Continue reading Poland blames Russia for breach, theft of Polish officials emails

Why XDR is Not Enough

By Guy Rosefelt, Security CMO, Sangfor Technologies What is XDR? One of the latest trends in cybersecurity is Extended Detection and Response, more commonly known as XDR. Although originally defined by Palo Alto Networks as a key capability, other security vendors have released some type of XDR functionality and of course all define and approach … Continue reading Why XDR is Not Enough

The return of TA402 Molerats APT after a short pause

TA402 APT group (aka Molerats and GazaHackerTeam) is back after two-month of silence and is targeting governments in the Middle East. The TA402 APT group (aka Molerats and Gaza Cybergang) is back after a two-month of apparent inactivity, it is targeting government institutions in the Middle East and global government entities with interest in the … Continue reading The return of TA402 Molerats APT after a short pause

Data Breaches Surge in Food & Beverage, Other Industries

Data Breaches Surge in Food & Beverage, Other Industries Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows. Though no industry is immune from cyberattacks, a few have traditionally been less affected by them than others. A new study shows … Continue reading Data Breaches Surge in Food & Beverage, Other Industries

‘Oddball’ Malware Blocks Access to Pirated Software

Rather than steal credentials or hold data for ransom, a recent campaign observed by Sophos prevents people from visiting sites that offer illegal downloads. The objective of most malware is some kind of gain — financial or otherwise — for the attackers who use it. However, researchers recently observed a unique malware with a single … Continue reading ‘Oddball’ Malware Blocks Access to Pirated Software

Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Devices have multiple OSs and firmware running, and most organisations don't know what they have or if it's secure. Microsoft will use ReFirm to make it easier to find out without being an expert. Image: Microsoft As operating systems become more secure, attackers are increasingly shifting their attention to firmware, which is less visible, more … Continue reading Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

The Solution to Overcoming Cyber Threats in A 5g World

Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security By Michael Abad-Santos, Senior Vice President of Business Development and Strategy, BridgeComm Nearly 6 billion Internet of Things (IoT) devices were in service worldwide at the end of 2020, according to Gartner. But mobile operators aren’t the only ones chasing that opportunity. Hackers are, too. … Continue reading The Solution to Overcoming Cyber Threats in A 5g World