0 Comments
Two California cybersecurity companies have joined forces to help protect healthcare networks from cyber-threats.  CynergisTek and Awake Security announced yesterday that they are pooling resources to develop an online threat assessment program that healthcare organizations can use to identify attacker activity.  Ben Denkers, CynergisTek SVP of security and privacy services, said the partnership was conceived after the outbreak of
0 Comments
Internet users have named Facebook as the online platform that poses the biggest security risk to their personal data.   A survey conducted by Australia’s Edith Cowan University found that 68% of respondents believed their data to be insecure on Facebook. Instagram and Twitter were viewed as risky by 65% and 57% of respondents, respectively. Social media was
0 Comments
The Federal Bureau of Investigation has issued a warning to online shoppers after a rise in the number of Americans not receiving items purchased on the internet.  In a statement published yesterday, the FBI said that an increasing number of victims are being directed to fraudulent websites via social media platforms and popular online search engines.  Complainants
0 Comments
Michigan’s largest healthcare provider has warned around 6,000 patients that their data may have been exposed following a cyber-attack. The cybersecurity incident is the second phishing-related data breach to befall Beaumont Health in recent months.  In April, the organization started notifying 112,211 individuals that some of their personal health information (PHI) had been exposed. The warning came after a data
0 Comments
Cloud breaches are likely to increase in “velocity and scale” due to a prevalence of poor cybersecurity practices in cloud configurations that are creating exposures. This is according to the most recent The State of DevSecOps report by Accurics, which assesses cloud configuration practices that lead to breaches. The study found that 93% of cloud deployments
0 Comments
Digital asset infrastructure company Copper Technologies has announced the appointment Jake Rogers as its new chief information security officer. Rogers has joined the London-based firm with immediate effect from Amnesty International, where he held the position of head of information security, responsible for the confidentiality and security of 70 offices and 3500 members of staff
0 Comments
Tanium has partnered with Google Cloud to integrate threat response and Chronicle’s security analytics platform. The partnership will unite the Tanium unified endpoint management and security platform with Google Cloud’s security analytics and zero-trust initiatives, which the companies claimed would better detect, investigate,and scope advanced persistent threats. Also, an integration between Tanium and Google Cloud’s BeyondCorp
0 Comments
Just under half of businesses have experienced at least one “business impacting cyber-attack” related to COVID-19 as of April 2020. According to research of 416 security and 425 business executives by Forrester Consulting and Tenable, 41% of respondents reported the statistic related to COVID-19, whilst 94% of executives say their firms have experienced a business-impacting
0 Comments
by Paul Ducklin The US Department of Justice just issued a press release entitled simply, “Three Individuals Charged for Alleged Roles in Twitter Hack.” In some ways, the Twitter hack referred to, which happened just two weeks ago on 2020-07-15, was tiny. In a world in which data breaches involving millions, hundreds of millions and
0 Comments
by Naked Security writer View our recent articles: ProLock ransomware – new report reveals the evolution of a threat Firefox 79 is out – it’s a double-update month so patch now! US tax service says, “2FA is a must!” Servers at risk from “BootHole” bug – what you need to know Travel company CWT avoids
0 Comments
by Paul Ducklin Law enforcement in Belarus has announced the arrest of a 31-year-old man who is alleged to have extorted more than 1000 victims with the infamous GandCrab ransomware in 2017 and 2018. He apparently demanded payments ranging from $400 to $1500 in Bitcoin. Unlike more targeted attacks where crooks break into networks first
0 Comments
The following analysis was compiled and published to Threat Intelligence clients in July 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly sharing insights about the IRON LIBERTY threat group, as well as details about the Karagany and MCMD malware used exclusively by IRON LIBERTY, to supplement the discussion of the man-on-the-side technique described in the
0 Comments
The following analysis was compiled and published to Threat Intelligence clients in August 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly sharing insights about the IRON LIBERTY threat group, as well as details about the Karagany and MCMD malware used exclusively by IRON LIBERTY, to supplement the discussion of the man-on-the-side technique
0 Comments
The following analysis was compiled and published to Threat Intelligence clients in September 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly sharing insights about the IRON LIBERTY threat group, as well as details about the Karagany and MCMD malware used exclusively by IRON LIBERTY, to supplement the discussion of the man-on-the-side technique described in
0 Comments
Summary The REvil (also known as Sodinokibi) ransomware was first identified on April 17, 2019. It is used by the financially motivated GOLD SOUTHFIELD threat group, which distributes ransomware via exploit kits, scan-and-exploit techniques, RDP servers, and backdoored software installers. Secureworks® Counter Threat Unit™ (CTU) analysis suggests that REvil is likely associated with the GandCrab
0 Comments
Summary The activities of some non-governmental organizations (NGOs) challenge governments on politically sensitive issues such as social, humanitarian, and environmental policies. As a result, these organizations are often exposed to increased government-directed threats aimed at monitoring their activities, discrediting their work, or stealing their intellectual property. BRONZE PRESIDENT is a likely People’s Republic of China
0 Comments
The following analysis was compiled and published to Threat Intelligence clients in November 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly sharing insights about BRONZE VINEWOOD and its use of the HanaLoader malware and DropboxAES RAT, to increase visibility of the threat group’s activities. In mid-2018, Secureworks® Counter Threat Unit™ (CTU) researchers identified
0 Comments
The following analysis was compiled and published to Threat Intelligence clients in March 2019. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly sharing insights about BRONZE VINEWOOD and its use of the HanaLoader malware and DropboxAES RAT, to increase visibility of the threat group’s activities. Summary DropboxAES is a simple remote access trojan (RAT) used