Cyber Threats July 19, 2022 ICS Systems Infected with Sality Malware via Password Recovery Tool A threat actor is gaining access to industrial control systems (ICS) using a Trojan horse password recovery tool that claims to recover passwords for programmable ... Read more
Security Breaches July 18, 2022 North Korean Hackers Behind HolyGhost Ransomware Attacks on SMBs A ransomware family called HolyGhost that is being used in attacks on SMBs has been linked to a suspected North Korean state-sponsored hacking group by ... Read more
Cyber Threats July 14, 2022 Security Vendors Impersonated in Callback Phishing Campaign The cybersecurity vendor CrowdStrike has issued a warning about a callback phishing campaign that attempts to trick employees at businesses into visiting a malicious website. ... Read more
Security Breaches July 13, 2022 Massive Phishing Campaign Bypasses MFA to Gain Access to Office 365 Accounts for BEC Attacks This week, Microsoft shared details of a massive phishing campaign that has targeted more than 10,000 organizations since September 2021. The campaign targets organizations that ... Read more
Trends & Reports July 12, 2022 Microsoft Rollback of VBA Macro Blocking is Only a Temporary Measure Last week, Windows users started noticing that Microsoft had stopped blocking Internet-delivered VBA macros by default without making an announcement. Microsoft has now confirmed that ... Read more
Trends & Reports July 11, 2022 Study Highlights the Importance of Password Complexity Poor security practices are commonly exploited by threat actors, and one of those practices that stands out is the exploitation of weak credentials. A password ... Read more
Cyber Threats July 8, 2022 Threat Groups Observed Substituting Cobalt Strike for Stealthier Post-Exploitation Framework Cyber threat actors are frequently observed deploying a legitimate penetration testing and post-exploitation framework known as Cobalt Strike on victims’ systems. Cobalt Strike is used ... Read more
Compliance July 7, 2022 U.S. Healthcare Sector Warned About Maui Ransomware Attacks by North Korean Hackers North Korean state-sponsored hackers are targeting organizations in the U.S. healthcare and public health sector (HPH) and are using Maui ransomware for extortion, according to ... Read more
Compliance July 6, 2022 PFC USA Data Breaches Affects Almost 660 Healthcare Provider Clients Professional Finance Company Inc., (PFC) one of the largest accounts receivable management agencies in the United States, has announced that it was the victim of ... Read more
Security Breaches July 5, 2022 Hacker Claims Records of 1 Billion Chinese Nationals Stolen from Shanghai National Police A hacker operating under the name ChinaDan claims to have stolen over 23 terabytes of data from Shanghai National Police (SHGA) databases. The dataset includes ... Read more
Compliance July 4, 2022 New IIS Backdoor Identified in Microsoft Exchange Servers Security researchers at Kaspersky have sounded the alarm about a new malware threat that is being used to gain persistent, stealthy access to corporate Microsoft ... Read more
Security Breaches June 30, 2022 New AstroLocker Ransomware Variant Detected Being Distributed Directly Through Email Attachments A new version of AstroLocker ransomware has been detected which is being delivered directly via email attachments. Astrolocker is a relatively new ransomware threat that ... Read more
Trends & Reports June 30, 2022 Three Quarters of the Most Popular Websites Allow Bad Passwords to be Set If you ever need to create an account online you will need to set a password to prevent unauthorized access. While passwords can prevent the ... Read more
Tools & Practices June 29, 2022 FBI Warns Employers About Use of Deepfakes to Land Remote Working Positions The Federal Bureau of Investigation has issued a warning to businesses due to an increasing number of complaints received by its Internet Crime Complaint Center ... Read more
Trends & Reports June 27, 2022 How to Reduce Password Security Risks Passwords are used to prevent unauthorized access to accounts and data. While passwords can be effective, there are password security risks that need to be ... Read more
Compliance June 27, 2022 Why Don’t People Use Password Managers? With so many passwords to create and remember, keeping track of those passwords can become a problem. Best practices for creating passwords include setting a ... Read more
Cyber Threats June 24, 2022 Police in Europe Dismantle Multi-Million-Euro Phishing Operation An organized criminal gang that was operating a multi-million-Euro phishing operation has been dismantled by police forces in Belgium and the Netherlands, according to Europol. ... Read more
Security Breaches June 23, 2022 Cybersecurity Agencies Recommend Using PowerShell to Improve Forensics and Incident Response Windows PowerShell is a useful and powerful scripting language and configuration management tool that can be used by Windows and system administrators for creating scripts ... Read more
Tools & Practices June 22, 2022 Following Regulatory Recommendations for Passwords Does Not Necessarily Improve Password Security If you religiously follow regulatory standards for passwords you may think you have a good password policy, but it doesn’t mean that weak passwords are ... Read more
Security Breaches June 22, 2022 SharePoint and OneDrive Files Could be Vulnerable to Ransomware Attacks A potential vulnerability has been identified in Office 365 and Microsoft 365 that could be exploited by ransomware gangs to encrypt files stored on SharePoint ... Read more
Tools & Practices June 21, 2022 Microsoft Issues Out-of-Band Update to Fix Patch Tuesday-Related Issue on Arm Devices Microsoft has issued an out-of-band update to fix an issue with Windows devices with Arm chips that was caused when users applied their June 2022 ... Read more
Security Breaches June 17, 2022 Exposed Elasticsearch Instance Exposed the Data of Millions of BeanVPN Users 18.5GB of connection logs of individuals who use the free Virtual Private Network (VPN) service provided by BeanVPN have been exposed over the Internet. The ... Read more
Compliance June 16, 2022 Thousands Arrested in Interpol-Led Operation Targeting Social Engineering Scammers An international law enforcement operation led by Interpol that involved police forces in 76 countries has seen more than $50 million seized and thousands of ... Read more
Tools & Practices June 14, 2022 Guidance on HIPAA and Telehealth for When the COVID-19 Public Health Emergency Ends The U.S. Department of Health and Human Services has issued guidance on HIPAA and Telehealth to help healthcare organizations ensure compliance when the COVID-19 Public ... Read more
Cyber Threats June 13, 2022 Emotet Malware Infections Increased by 2,700% from Q4, 2021 to Q1, 2022 Security researchers have identified new variants of Emotet malware that are capable of collecting and using stolen credentials, which are then weaponized and used to ... Read more
Cyber Threats June 10, 2022 Researchers Uncover Massive Facebook and Messenger Phishing Campaign Security researchers at the cybersecurity firm PIXM have identified a massive phishing campaign being conducted through Facebook and Messenger, which has driven millions of individuals ... Read more
Compliance June 8, 2022 Medical Data of 2 Million Individuals Stolen in Shields Health Care Group Cyberattack The personal and healthcare data of up to 2 million patients has been compromised in a hacking incident at Shields Health Care Group. Shields Health ... Read more
Cyber Threats June 7, 2022 Local Governments Targeted in Phishing Campaign Exploiting Windows Follina Vulnerability The critical Windows ‘Follina’ zero-day vulnerability is being exploited in phishing attacks on local governments in the United States and government entities throughout Europe, according ... Read more
Security Breaches June 6, 2022 Feds Announce Seizure of Domains Used for Selling Stolen Credentials and Conducting DDoS Attacks The Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) have announced they have seized the domain weleakinfo.to, along with two related domains ... Read more
Cyber Threats June 3, 2022 Zero-day Atlassian Confluence Vulnerability Being Actively Exploited by Multiple Threat Actors A critical Atlassian Confluence zero-day vulnerability is being actively exploited by multiple threat actors. At present, there is no patch available to fix the flaw. The ... Read more