0mega ransomware gang changes tactics
A number of ransomware gangs have stopped using malware to encrypt targets’ files and have switched to a data theft/extortion approach to get paid; 0mega – a low-profile and seemingly not very active threat actor – seems to be among.....»»
Hackers are carrying out ransomware experiments in developing countries
Businesses in Africa, Asia, and South America hit before moving on to western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia and South.....»»
Veeam acquires Coveware to boost its ransomware protection capabilities
Veeam Software announced the acquisition of Coveware, a provider in cyber-extortion incident response. It brings ransomware recovery and first responder capabilities to further strengthen Veeam’s radical resilience solutions for customers. Coveware.....»»
Align introduces ransomware prevention feature, powered by Adlumin
Align announces the inclusion of a new ransomware prevention feature to enhance its Align Guardian Managed Detection and Response offering powered by Adlumin. This innovative solution is designed to detect and halt ransomware in its tracks, safeguard.....»»
Behavioral patterns of ransomware groups are changing
Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% yea.....»»
Elizabeth Warren on green texts: Apple is ruining relationships
Senator Elizabeth Warren has tweeted a somewhat bizarre one-minute video in which she says that green texts are “ruining relationships” and that this is “just one of the dirty tactics that Apple uses to keep a stranglehold on the smartphone mar.....»»
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
More organizations hit by ransomware gangs are starting to realize that it doesn’t pay to pay up: “In Q1 2024, the proportion of victims that chose to pay touched a new record low of 28%,” ransomware incident response firm Coveware.....»»
Whistleblower reveals 2023 CareGard cyberattack, says F&I company concealed it from partners
AFG Cos. was unprepared for a ransomware attack last summer, for months had been unsure of the extent of the breach, and as of early this month hadn't alerted automaker partners or the agents selling its coverage to dealerships, a whistleblower alleg.....»»
Former AFG exec reveals 2023 CareGard data breach, criticizes company"s response
AFG Cos. was unprepared for a ransomware attack last summer, for months had been unsure of the extent of the breach, and as of early this month hadn't alerted automaker partners or the agents selling its coverage to dealerships, a whistleblower alleg.....»»
Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
Since June 2023, Sophos X-Ops has discovered 19 junk gun ransomware variants — cheap, independently produced, and crudely constructed — on the dark web. The developers of these junk gun variants are attempting to disrupt the traditional affiliate.....»»
Research highlights new ways to tackle outlaw motorcycle gangs
Deakin University criminology research can provide clues for law enforcement about the relationship between outlaw motorcycle gang (OMCG) clubs and how to combat gang crime......»»
Q&A: For many prisoners, gang affiliation drops off after release
Nearly everyone who enters prison in the United States eventually leaves. In fact, every year about 600,000 people are released from federal and state prisons, according to U.S. Department of Justice data......»»
5 free red teaming resources to get you started
Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may include anything from social engineering to physical security breaches to sim.....»»
Change Healthcare faces another ransomware threat—and it looks credible
Hackers already received a $22 million payment. Now a second group demands money. Enlarge (credit: iStock / Getty Images Plus) For months, Change Healthcare has faced an immensely messy ransomware debacle that has left h.....»»
Rise in corporate Mac use invites more sophisticated hacking
Hackers are developing more complex, cross-platform tactics to take advantage of the ever increasing Mac user base, and the latest targets the TCC framework.The Mac's increasing popularity is a blessing and a curseThe Mac's reputation for strong secu.....»»
Ransomware group maturity should influence ransom payment decision
Your organization has been hit by ransomware and a decision has to be made on whether or not to make the ransom payment to get your data decrypted, deleted from attackers’ servers, and/or not leaked online. The decision will depend on a variety.....»»
Index Engines CyberSense 8.6 detects malicious activity
Index Engines announced the latest release of its CyberSense software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold Alerts to proactively detect unusual activ.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»