-
MIT Publishes Framework to Evaluate Cybersecurity Methods
PRIVACY PRIVACY It assesses information hackers could get from a victim program protected by an obfuscation scheme Read More
-
Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
PRIVACY PRIVACY Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration Read More
-
Redacting Documents with a Black Sharpie Doesn’t Work
PRIVACY PRIVACY We have learned this lesson again: As part of the FTC v. Microsoft hearing, Sony supplied a document from PlayStation chief Jim Ryan that includes redacted details on the margins Sony shares with publishers, its Call of Duty revenues, and even the cost of developing some of its games. It looks like someone…
-
LockBit Dominates Ransomware World, New Report Finds
PRIVACY PRIVACY LockBit becomes one of the first major ransomware operations to specifically target macOS Read More
-
Over 1500 gas stations disrupted in Canada, after energy giant hacked
PRIVACY PRIVACY Suncor, one of the largest energy companies in North America, has suffered a cyber attack that left Canadian motorists unable to make gas station purchases with payment cards, and even disabled car washes. Read more in my article on the Hot for Security blog. Read More
-
VPN and RDP Exploitation the Most Common Attack Technique
PRIVACY PRIVACY Initial access brokers still play a key role in threat supply chain Read More
-
Stories from the SOC: Fighting back against credential harvesting with ProofPoint
PRIVACY PRIVACY Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat and can lead to more harmful attacks such as ransomware and credential harvesting.…
-
US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases
PRIVACY PRIVACY Nearly 80 individuals accused of participating in multiple schemes Read More
-
Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
PRIVACY PRIVACY Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry Read More
-
Manifest Confusion Threat Undermines Trust in Entire Npm Registry
PRIVACY PRIVACY Former manager takes registry to task for slow response Read More