Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 13, 2024 The German agency BSI has sinkholed a botnet composed of 30,000 devices shipped with BadBox...
Day: December 13, 2024
U.S. authorities seized cybercrime marketplace Rydox – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 13, 2024 The U.S. Department of Justice (DoJ) announced the seizure of the cybercrime marketplace Rydox (“rydox.ru”...
Experts discovered the first mobile malware families linked to Russia’s Gamaredon – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 13, 2024 The Russia-linked APT Gamaredon used two new Android spyware tools called BoneSpy and PlainGnome against former Soviet states....
US Bitcoin ATM operator Byte Federal suffered a data breach – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 12, 2024 US Bitcoin ATM operator Byte Federal suffered a data breach impacting 58,000 customers, attackers gained...
How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify – Source:www.hackerone.com
Source: www.hackerone.com – Author: Andrew Pratt. Every time you access an application that is designed for use with multiple accounts, you inherit a certain level of...
How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Crypto and blockchain organizations are among the most progressive, and often the first to adopt new technological developments and solutions to...
US Uncovers North Korean IT Worker Fraud, Offers $5M Bounty – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US Government has offered a $5m reward for information that leads to the disruption of financial mechanisms of persons engaged in...
2024 Sees Sharp Increase in Microsoft Tool Exploits – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Threat actors’ abuse of legitimate Microsoft tools rose by 51% in the first half of 2024 compared to 2023, according...
Akira and RansomHub Surge as Ransomware Claims Reach All-Time High – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Ransomware claims reached an all-time high in November 2024, with Corvus Insurance reporting 632 victims claimed on ransomware groups’ data leak sites...
Researchers Discover Malware Used by Nation-Sates to Attack Industrial Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Researchers at industrial cybersecurity provider Claroty have discovered a new tool nation-state cyber threat actors use to attack civilian critical...
ISC2 Survey Reveals Critical Gaps in Cybersecurity Leadership Skills – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Leadership training and skills are severely lacking in the cybersecurity industry, according to ISC2’s Cybersecurity Leadership Survey. The accreditation and training body...
UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Almost three quarters of UK consumers (71%) believe malicious bots are ruining Christmas by snapping up all the most wanted presents, according...
The Role of Blockchain and Smart Contracts in Securing Digital Transactions – Source:hackread.com
Source: hackread.com – Author: Waqas. Learn how blockchain and smart contracts improve cybersecurity factors in online transactions, remove the element of fraud, and promote trust with...
Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. SUMMARY Byte Federal, the largest US Bitcoin ATM operator, suffered a data breach affecting 58,000 customers. Hackers exploited a vulnerability...
Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management – Source:www.hackercombat.com
Source: www.hackercombat.com – Author: Hacker Combat. Cyber threats can wreak havoc on businesses, from data breaches to loss of reputation. Luckily, there are effective strategies available...
Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Vulnerabilities in the Reyee cloud management platform and Reyee OS network appliances could allow threat actors to take over tens...
US Updates a Science and Technology Pact With China to Reflect Growing Rivalry and Security Threats – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The U.S. has updated a decades-old science and technology agreement with China to reflect their growing rivalry for technological dominance....
In Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Bitcoin ATM operator Byte Federal is notifying 58,000 people that their personal information might have been compromised in a data...
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US on Thursday announced it has taken down Rydox, an illicit marketplace for stolen personal information and fraud tools,...
Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Microsoft on Thursday informed customers that two potentially critical vulnerabilities have been patched in Update Catalog and Windows Defender. The...
Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire At least 30,000 media devices were sold in Germany with pre-installed malware that ensnared them into a botnet, Germany’s Federal...
Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A notorious Iranian state-sponsored hacking group has been using custom-built malware to target IoT and operational technology (OT) devices in...
DeepSpeed: a tuning tool for large language models – Source: news.sophos.com
Source: news.sophos.com – Author: gallagherseanm SophosAI’s framework for upgrading the performance of LLMs for cybersecurity tasks (or any other specific task) is now open source. Large...
Crypto Roundup: Crypto Pros Targeted With Fake Meeting Apps – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime Also: Australia Fines Kraken AU$8 Million Over Breaches Prajeet Nair (@prajeetspeaks)...
Russia Used Borrowed Spyware to Target Ukrainian Troops – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Government Secret Blizzard Used Third-Party Amadey Bots to Hack Ukrainian Military Devices...
US Indicts 14 North Koreans in IT Scam Funding WMD Programs – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Cybercrime , Fraud Management & Cybercrime , Governance & Risk Management DOJ Indicts North Korean IT Workers for Using Remote Jobs to...
New Malware Framework Targets Cleo File Systems – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Attack Surface Management , Cybercrime , Fraud Management & Cybercrime Possible Long-Term Attack by Unknown Hackers Thwarted Prajeet Nair (@prajeetspeaks) , David...
Unlocking Compliance: The Role of SBOMs in Modern Software Development – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Presented by DigiCert 60 Minutes As software supply chain attacks grow more sophisticated, governments and industries are enforcing...
PUMA creeps through Linux with a stealthy rootkit attack – Source: www.csoonline.com
Source: www.csoonline.com – Author: The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection. A new loadable kernel module (LKM)...