-
Victims Lose $47m to Crypto Phishing Scams in February
Some 57,000 victims lost $47m in phishing scams targeting their cryptocurrency last month Read More
-
Magnet Goblin Exploits Ivanti Vulnerabilities
The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research Read More
-
Incognito Darknet Market Mass-Extorts Buyers, Sellers
Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from $100 to $20,000. The bold mass extortion attempt comes just days after Incognito Market administrators…
-
BianLian Threat Actor Shifts Focus to Extortion-Only Tactics
GuidePoint said the threat actor gained initial access via vulnerabilities in a TeamCity server Read More
-
NSA Launches Top 10 Cloud Security Mitigation Strategies
The advisory is associated with ten companion cybersecurity information sheets detailing how to implement each strategy Read More
-
Third-Party Breach and Missing MFA Contributed to British Library Cyber-Attack
A British Library report found the most likely source of the incident was the compromise of third-party account credentials and no MFA was in place to stop the attackers Read More
-
Using LLMs to Unredact Text
Initial results in using LLMs to unredact text based on the size of the individual-word redaction rectangles. This feels like something that a specialized ML system could be trained on. Read More
-
Telemedicine Business Owner Faces 20 Years For $136m Fraud
Nurse practitioner pleads guilty to $136m Medicare fraud plot involving her telemedicine companies Read More
-
Incident readiness is crucial for state and local governments
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The current cybersecurity landscape: Navigating threats and safeguarding local government operations Local governments in the United States faced a surge in cyber threats…
-
Russia’s Midnight Blizzard Accesses Microsoft Source Code
Threat group APT29 is using secrets stolen in an earlier attack to compromise Microsoft’s internal systems Read More