Source: securityboulevard.com – Author: Jeffrey Burt Hackers are using a bogus download page for Bitwarden’s password manager solution to target Windows users with a new remote...
Author: Jeffrey Burt
Xenomorph Android Banking Trojan Makes Landfall in US – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A sophisticated Android banking trojan that was first seen last year targeting banking apps in several European countries has made...
Data Breaches from MOVEit Zero-Day Still Piling Up – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Cybercrime groups exploiting the zero-day flaw in the MOVEit managed file transfer software linked to the Cl0p ransomware gang continue...
China Accuses US of Years of Cyber-Spying, Malware Campaigns – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The Chinese government is accusing the United States intelligence community of launching cyber-espionage campaigns against the country for years after...
LockBit Affiliates Use RMM Software in Ransomware Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Affiliates of the Russia-linked LockBit ransomware group are using remote monitoring and management (RMM) software to distribute its malicious payload...
Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The threat group that claims to have been involved in the high-profile attacks earlier this month on casino operators MGM...
Attackers Target Crypto Companies in Retool Data Breach – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A data breach late last month of software development platform firm Retool led to the accelerated acquisition of one of...
GitHub Vulnerability Put Code Packages at Risk of Repojacking – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A new vulnerability found in GitHub’s operations could have given bad actors another way of getting around the code hosting...
Data Breach of AP Stylebook Leads to Phishing Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Users of the AP Stylebook have been targeted in phishing campaigns by bad actors using personal information stolen in a...
Emsisoft to Users: Update Software, Reboot Systems After Certificate Error – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Cybersecurity firm Emsisoft is telling users to update their anti-virus and other security software in the wake of an error...
High-Profile California Bill Regulating Data Brokers Heads for Key Vote – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt California lawmakers later this month are expected to vote on a highly debated bill that would make it easier for...
W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A relatively unknown threat group that six years ago started with a custom tool used for bulk email spam is...
Clicked on a Phishing Email? All Is Not Lost – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Phishing continues to be a bane of organizations. Phishing accounts for 36% of all data breaches, according to Verizon, and...
Item Recycling Site Freecycle is Hit with a Massive Data Breach – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Millions of people who use the Freecycle online forum to swap unwanted items may now have their passwords, email addresses,...
APT Group Earth Estries Runs Espionage Campaigns Against US, Others – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A newly discovered cyber-espionage threat group for at least three years has been using advanced and novel tools to steal...
LockBit Builder Leak Leads to Flood of Ransomware Variants – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The leak 11 months ago of the builder for the LockBit 3.0 ransomware opened the door for any threat actor...
3 Malware Loaders are Responsible for 80% of Attacks, ReliaQuest Says – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt About 80% of the cybersecurity incidents tracked by ReliaQuest during the first seven months of the year involved only three...
Tor Adopts a Proof-of-Work Defense to Protect Against DDoS Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Tor, the routing service that stresses anonymity and for almost a year was under a distributed denial-of-service (DDoS) attack, is...
Scammers Target Online Markets with Telekopye Phishing Toolkit – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Bad actors are using a full-featured phishing toolkit to target large numbers of users of popular online shopping sites like...
Founders of Crypto Mixer Tornado Cash Indicted for Laundering $1 Billion – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The U.S. government is taking a big swing at two founders of the Tornado Cash cryptocurrency mixer that allegedly laundered...
Spin.AI: Browser Extensions Bring High Security Risks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Software-as-a-service (SaaS) applications have become foundational to enterprises that use them to drive productivity, improve the customer experience, and connect...
Enterprises Eyeing More Proactive Cybersecurity Strategies, Survey Finds – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Enterprise security teams are having problems keeping pace with the rapid evolution of increasingly sophisticated threat groups despite having the...
By Following the Crypto, Cyfirma Identifies Developer Behind CraxsRAT – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The person responsible for developing the dangerous CraxsRAT malware that targets Android devices has been operating in Syria for more...
Cuba Ransomware Group Exploiting Veeam Flaw in Latest Campaign – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The high-profile Cuba ransomware group is abusing a security flaw in software from Veeam on recent attacks on a critical...
Play Ransomware Targets Victims Via MSPs’ RMM Software – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The Play ransomware operators who took credit for the attack on the city of Oakland, California, in February is now...
Google Eyes Quantum with New Security Key Implementation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Google is taking steps this month to help the cybersecurity field stay ahead of the looming security threat that is...
Passwords are Evolving as a Passwordless Future Draws Nearer – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Enterprises are developing strategies now to protect identities from being stolen and abused even as a true passwordless future is...
Monti Returns From 2-Month Break with Revamped Ransomware Variant – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The Monti ransomware group that emerged in June 2022 used source code, tools, and tactics – not to mention an...
Zero-Day Flaws an Evolving Weapon in Ransomware Groups’ Arsenals – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Ransomware gangs have for years gotten their malicious payloads into targeted systems primarily through phishing attacks or being dropped as...
Using Automation to Hunt for the Elusive LOLBAS – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Researchers at cybersecurity vendor Pentera knew that the attack method known as LOLBAS over the past few years has become...