Eskenzi PR ad banner Eskenzi PR ad banner

News

code on a screen close up

Reportedly, CloudSEK used its artificial intelligence (AI)-powered digital risk platform XVigil to identify a post on a cybercrime forum mentioning open source automation server platform Jenkins as one of the TTP (tactics, techniques, and procedures) used by a threat actor (TA) in attacks against IBM and Stanford University. Used by a TA to get clicks on ads, the module has hidden desktop takeover capabilities. The post on the English-speaking forum was spotted by CloudSEK on...

Read more
Microsoft Office Building

Microsoft's Security Intelligence team have issued a new warning against a known cloud threat actor group. Active since early 2017 and tracked as 8220, the group have now updated its malware toolset to breach Linux servers to install crypto miners as part of a long-running campaign. On Thursday, Microsoft wrote in a Twitter thread, “the updates include the deployment of new versions of a cryptominer and an IRC bot, as well the use of an...

Read more
Macmillan Publishers Shut Down Systems After Security Incident

Publishing firm Macmillan was forced to shut down their network and offices while recovering from a security incident that appears to be a ransomware attack. The attack reportedly occurred on Saturday 25th June, with the company shutting down all their IT systems to prevent further spread. Publishers Weekly first reported on the incident, having seen emails from Macmillan that stated they suffered a "security incident, which involves the encryption of certain files on our network."...

Read more
Man Arrested in LA For Alleged Involvement in Multi-Million Dollar Fraud Scheme

Yesterday, a man was arrested in Los Angeles on suspicion of masterminding a multi-million dollar investment fraud scheme that tricked over 10,000 victims. Neil Chandran, 50, from Las Vegas, was charged with three counts of wire fraud and two counts of engaging in monetary transactions in criminally derived property. Chandran owned several technology companies that marketed themselves to investors, according to the Department of Justice (DoJ), as promising high returns on the basis that they...

Read more
Canadian Flag

Early this week, an ex-Canadian government employee pleaded guilty in a Florida court to charges of involvement with the NetWalker ransomware group. Sebastien Vachon-Desjardins, 34, was accused of conspiracy to commit computer fraud and wire fraud, as well as intentional damage to a protected computer and transmitting a demand concerning damaging a protected computer. In January, a US global action was launched against the NetWalker cyber-criminal gang. Vachon-Desjardins was extradited in March. In February, Justice...

Read more
Red and blue flag with white circle and red star (North Korea). Six flags flying in sky. Trees.

The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge. Last week Harmony confirmed that its Horizon Bridge, a platform that allows users to move cryptocurrency across different blockchains, had been breached. The incident involved the exploiter carrying out multiple transactions on 23rd June that extracted tokens stored in the bridge and stole approximately $100 million in cryptocurrency. Elliptic, a blockchain analytics...

Read more
Walmart Denies Being Hit by Yanlouwang Ransomware Attack

The American retailer Walmart has denied being hit with a ransomware attack by the Yanlouwang gang after hackers claimed to encrypt thousands of computers. According to BleepingComputer, Walmart said that their "Information Security team is monitoring our systems 24/7," and believe the claims to be inaccurate. "We believe this claim is inaccurate and are not aware of a successful attack in this regard on our devices," a Walmart said. On Monday, the Yanluowang ransomware operation,...

Read more
YTStealer Malware Found to Steal Accounts From Creators

YTStealer, a new information-stealing malware, is targeting YouTube content creators and attempting to steal their authentication tokens and hijack their channels. Focusing on one goal has given YTStealer's authors the capacity to make its token-stealing operation very effective, according to a report published earlier this week by Intezer. Most of its distribution uses lures impersonating software that edits videos or acts as content for new videos, targeting YouTube creators. Examples of impersonated software that contains...

Read more

A new survey from Bridewell, a cybersecurity services company, found that 95% of respondents are experiencing factors that would make them likely to leave in the next 12 months. Of the 521 critical national infrastructure decision makers who were surveyed, 40% said stress could push them to leave their job with the next year. These industry leaders attribute their desire to two dominant causes: 42% say a cyber breach is inevitable and do not want...

Read more
Phone with white background

Whether you are ordering food online, booking a doctor's appointment, or checking your balance, you are doing it through your phone. For many years we believed that we had a valid reason to trust our phone with sensitive information. Today, we have to acknowledge that this isn't completely true and examine the risks inherent in our mobile devices. Looking ahead to 2022, these are the threats to be on the lookout for. DATA LEAKS Accepting...

Read more
Page 30 of 364 1 29 30 31 364