0 Comments
by Mark Stockley For two and a half years someone has been terrorising organisations by breaking in to their networks and infecting their computers with devastating, file-encrypting malware known as SamSam. The attacks are regular, but rarer and more sophisticated than typical ransomware attacks, and the perpetrators extort eye-watering, five-figure ransoms to undo the damage they
0 Comments
All of the good press the June Intelligent Oven got when it launched in late 2016 was overshadowed by one key thing: that ridiculously high price tag. The startup drew comparisons to the now defunct train wreck that was Juicero, with one review going so far as calling it “everything that’s wrong with Silicon Valley.”
0 Comments
The FBI has been forced to post a public service announcement warning of the dangers of unprotected IoT devices. In another sign of the growing threat posed by compromised smart devices, the update late last week claimed that attackers are using them as proxies to maintain anonymity and obfuscate network traffic. Doing so enables them
0 Comments
The GandCrab ransomware first appeared in January and has updated itself rapidly during its short life. It is the leading ransomware threat. The McAfee Advanced Threat Research team has reverse engineered Versions 4.0 through 4.2 of the malware. The first versions (1.0 and 1.1) of this malware had a bug that left the keys in
0 Comments
A hospital in Missouri faces a lawsuit after a medical records breach occurred as a result of an email phishing scam, something that’s difficult to protect against within healthcare organizations, according to a security expert.   In January, Children’s Mercy Hospital in Kansas City, Mo., notified 63,049 individuals who were potentially affected by the medical records
0 Comments
A newly discovered adversarial group has been targeting operations in electrical utilities in the US, according to Dragos. The activity group, dubbed RASPITE, has reportedly been active in some capacity since early to mid-2017. Dragos has confirmed that RASPITE is now targeting ICS, specifically electric utilities in the US, Europe, Middle East and East Asia. While
0 Comments
by Lisa Vaas The DOJ announced on Wednesday that three alleged, “high-ranking” members of the notorious Fin7 cybercrime organization have been arrested. According to three federal indictments, Ukrainian nationals Dmytro Fedorov, 44, Fedir Hladyr, 33, and Andrii Kolpakov, 30, are allegedly members of a prolific, professional, highly adaptable hacking group widely known as Fin7, though
0 Comments
Security researchers have discovered at least three massive malware campaigns exploiting hundreds of thousands of unpatched MikroTik routers to secretly install cryptocurrency miners on computers connected to them. In all, the malware campaigns have compromised more than 210,000 routers from Latvian network hardware provider Mikrotik across the world, with the number still increasing as of
0 Comments
Author: Joe Stewart and James Bettke, SecureWorks® Counter Threat Unit™ Threat Intelligence Summary “Nigerian prince” and “419” scams have plagued victims for decades and transitioned to the Internet in the 1990s. There are many variations and names for these scams, which originated in Nigeria. The scammers refer to their trade using the terms “yahoo yahoo”
0 Comments
Editor’s note: One of the steps that generally precedes a network-based attack is port scanning, in which a hacker… tries to discover which services are being offered in order to launch a more specific attack. This article reveals a port-scanning technique that, contrary to most other techniques, does not reveal the location of the system
0 Comments
A national nonprofit organization, SecureSet Foundation, created by SecureSet Academy, aims to increase diversity in the cybersecurity workforce by offering financial assistance, according to a press release from SecureSet Academy. The creation of the SecureSet Foundation will enable individuals to enhance and build their professional skills in the field of cybersecurity, which will also help
0 Comments
The nature of the vulnerability hasn’t been disclosed, but is said to have already been identified and fixed Several hundred inmates at five prisons in the northwestern US state of Idaho have exploited a software vulnerability in their “prison-specific” tablets to transfer $225,000 worth of digital credits to their virtual accounts, according to a BBC
0 Comments
I’m proud to say that McAfee has received recognition from our customers with the 2018 Gartner Peer Insights Customers’ Choice for the Security Information and Event Management (SIEM). This is a recognition of high satisfaction from a number of reviews by verified end-user professionals. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors
0 Comments
Summary The IRON TWILIGHT threat group has targeted non-governmental organizations (NGOs), journalists, politicians, political organizations, governments, and militaries since at least 2009. SecureWorks® Counter Threat Unit™ (CTU) researchers assess it is highly likely that IRON TWILIGHT is sponsored by the Russian government. In Spring 2015, the Russian government began tasking IRON TWILIGHT with activity beyond
0 Comments
It sounds great to be able to assess information from threats targeting organizations all around the globe and not just the ones coming directly at you. But threat intelligence tools, and the loads of data they deliver, can turn out to be about as useful as junk mail. Expensive junk mail. This handbook on global