Advertisements


Akira ransomware attackers are wiping NAS and tape backups

“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 re.....»»

Category: securitySource:  netsecurityJan 12th, 2024

PostgreSQL databases under attack

Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»

Category: securitySource:  netsecurityRelated NewsAug 21st, 2024

Vulnerabilities in Microsoft macOS apps may give attackers access to microphone, camera

Vulnerabilities in popular Microsoft apps for macOS can be abused by attackers to record video and audio clips, take pictures, access and exfiltrate data and send emails, Cisco Talos researchers have discovered. Library injection vulnerabilities in M.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

Vulnerability in Microsoft apps allowed hackers to spy on Mac users

A vulnerability found in Microsoft apps for macOS allowed hackers to spy on users. Security researchers from Cisco Talos reported in a blog post how the vulnerability could be exploited by attackers and what Microsoft has been doing to fix the explo.....»»

Category: topSource:  theglobeandmailRelated NewsAug 20th, 2024

Security flaws in Microsoft Mac apps could let attackers spy on users

Cisco Talos recently uncovered security vulnerabilities in several Microsoft apps for macOS that can potentially let attackers spy on your camera and other system components.Security flaws found in Microsoft apps for MacTalos claims to have found eig.....»»

Category: appleSource:  appleinsiderRelated NewsAug 19th, 2024

Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited.....»»

Category: securitySource:  netsecurityRelated NewsAug 18th, 2024

Crypto-linked cybercrime saw another record year as ransomware risk rises

Ransomware operators have earned more money in 2024 compared to last year as scam possibilites grow......»»

Category: topSource:  marketingvoxRelated NewsAug 16th, 2024

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind t.....»»

Category: securitySource:  netsecurityRelated NewsAug 15th, 2024

Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)

SolarWinds has fixed a critical vulnerability (CVE-2024-28986) in its Web Help Desk (WHD) solution that may allow attackers to run commands on the host machine. “While it was reported as an unauthenticated vulnerability, SolarWinds has been una.....»»

Category: securitySource:  netsecurityRelated NewsAug 15th, 2024

Unlearning the RaaS Model: How ransomware attacks are evolving

Unlearning the RaaS Model: How ransomware attacks are evolving.....»»

Category: topSource:  theglobeandmailRelated NewsAug 15th, 2024

Australian gold mining company hit with ransomware

Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. .....»»

Category: securitySource:  netsecurityRelated NewsAug 13th, 2024

Stellar strengthens security for remote teams

Stellar has launched enhanced remote wiping capabilities within its Drive Erasure software. This feature is designed to address the complexities of managing data security in today’s distributed work environment. The new Remote Wiping software e.....»»

Category: securitySource:  netsecurityRelated NewsAug 13th, 2024

FBI claims success in taking down another major ransomware group

Law enforcement seized dozens of servers belonging to Radar, but no one was arrested......»»

Category: topSource:  marketingvoxRelated NewsAug 13th, 2024

International investigation shuts down Radar/Dispossessor ransomware group

FBI Cleveland announced the disruption of “Radar/Dispossessor”—the criminal ransomware group led by the online moniker “Brain”—and the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.....»»

Category: securitySource:  netsecurityRelated NewsAug 13th, 2024

Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)

A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited by attackers to grab users’ NTLM hashes, Microsoft has shared late last week. The vulnerability is exploitable remotely and requires no special privileges or user interact.....»»

Category: securitySource:  netsecurityRelated NewsAug 12th, 2024

74% of ransomware victims were attacked multiple times in a year

An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices,.....»»

Category: securitySource:  netsecurityRelated NewsAug 12th, 2024

“0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox

A “0.0.0.0-Day” vulnerability affecting Chrome, Safari and Firefox can be – and has been – exploited by attackers to gain access to services on internal networks, Oligo Security researchers have revealed. The vulnerability ste.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals

The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) to exploit vulnerabilities and evade detection, according to Darktrace. Subscription-based tools su.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

A critical security issue in 1Password for Mac left credentials vulnerable to attack

1Password has disclosed a now patched critical security flaw in its software that could give attackers access to users' unlock keys and credentials. Here's what to do to keep your data safe.1Password has disclosed a critical security flaw present in.....»»

Category: appleSource:  appleinsiderRelated NewsAug 9th, 2024

1Password 8 for Mac flaw allows attackers to steal credentials, here’s how to patch it

1Password has shared that its software for Mac has a vulnerability that exposes users to a potentially serious threat. Along with attackers being able to compromise credentials, the flaw can give bad actors access to your account unlock key. more.....»»

Category: topSource:  pcmagRelated NewsAug 8th, 2024

Microsoft 365 anti-phishing alert “erased” with one simple trick

Attackers looking for a way into organizations using Microsoft 365 can make an alert identifying unsolicited (and thus potential phishing) emails “disappear”. “When an Outlook user receives an e-mail from an address they don’t typ.....»»

Category: securitySource:  netsecurityRelated NewsAug 8th, 2024