Attack on meat supplier came from REvil, ransomware’s most cutthroat gang
Criminals use high-pressure tactics to extort victims. Enlarge / Ransomware (credit: Getty Images) The cyberattack that halted some operations at the world’s biggest meat processor this week was the work of REvil, a ransomware franchise know.....»»
Hackers infect users of antivirus service that delivered updates over HTTP
eScan AV updates were delivered over HTTP for five years. Enlarge (credit: Getty Images) Hackers abused an antivirus service for five years in order to infect end users with malware. The attack worked because the service.....»»
Seating supplier Adient plans European job cuts as part of restructuring plan
Adient is cutting jobs in Europe and transferring other roles to countries with lower labor costs, becoming the latest parts maker to eliminate positions in the region......»»
Plant-Based Meat Boomed. Here Comes the Bust
Sales of vegan meat are trending downward in the US, with companies scrambling to win back customers......»»
Veeam acquires Coveware to boost its ransomware protection capabilities
Veeam Software announced the acquisition of Coveware, a provider in cyber-extortion incident response. It brings ransomware recovery and first responder capabilities to further strengthen Veeam’s radical resilience solutions for customers. Coveware.....»»
Align introduces ransomware prevention feature, powered by Adlumin
Align announces the inclusion of a new ransomware prevention feature to enhance its Align Guardian Managed Detection and Response offering powered by Adlumin. This innovative solution is designed to detect and halt ransomware in its tracks, safeguard.....»»
Behavioral patterns of ransomware groups are changing
Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% yea.....»»
Windows vulnerability reported by the NSA exploited to install Russian malware
Microsoft didn't disclose the in-the-wild exploits by Kremlin-backed group until now. Enlarge (credit: Getty Images) Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attack.....»»
Windows vulnerability reported by the NSA exploited to install Russian backdoor
Microsoft didn't disclose the in-the-wild exploits by Kremlin-backed group until now. Enlarge (credit: Getty Images) Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attack.....»»
iPhone 16 Rumors Take Interesting Twist
An iPhone 16 design change that appeared to be dead in the water has resurfaced today in a report out of Asia. According to the Economic Daily News, Apple’s ordered a large number of capacitative button components from a supplier (Advanced Sem.....»»
iPhone 16 capacitive button rumor resurrected by supply chain report
As of late, the rumor mill has been quiet on the topic of all of the mechanical buttons on the iPhone 16 family being replaced by capacitive ones, but a new report claims a supplier has been picked to do just that.iPhone 16 Pro may have larger screen.....»»
Week in review: Palo Alto firewalls mitigation ineffective, PuTTY client vulnerable to key recovery attack
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation While it initially seemed that protecting Palo Alto Network firewalls f.....»»
Suppliers scramble to avoid low factory utilization amid rocky EV transition
The uneven ramp-up of electric vehicle production and flattening EV sales growth in North America have left suppliers scrambling to make sure they're not left with significantly underutilized factories, supplier executives said......»»
A hydrocarbon molecule as supplier and energy storage solution for solar energy
Until now, the generation and storage of electricity from solar energy has been dependent on various devices, leading to conversion losses. That may change soon, as chemists at Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) and other resea.....»»
Why zebrafish can regenerate damaged heart tissue, while other fish species cannot
A heart attack will leave a permanent scar on a human heart, yet other animals, including some fish and amphibians, can clear cardiac scar tissue and regrow damaged muscle as adults......»»
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
More organizations hit by ransomware gangs are starting to realize that it doesn’t pay to pay up: “In Q1 2024, the proportion of victims that chose to pay touched a new record low of 28%,” ransomware incident response firm Coveware.....»»
Whistleblower reveals 2023 CareGard cyberattack, says F&I company concealed it from partners
AFG Cos. was unprepared for a ransomware attack last summer, for months had been unsure of the extent of the breach, and as of early this month hadn't alerted automaker partners or the agents selling its coverage to dealerships, a whistleblower alleg.....»»
Former AFG exec reveals 2023 CareGard data breach, criticizes company"s response
AFG Cos. was unprepared for a ransomware attack last summer, for months had been unsure of the extent of the breach, and as of early this month hadn't alerted automaker partners or the agents selling its coverage to dealerships, a whistleblower alleg.....»»
51% of enterprises experienced a breach despite large security stacks
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according.....»»
Cyberattack on key parts supplier triggered dispute that cost Stellantis $300M, lawsuit says
The automaker lost more than $300 million in revenue because it was unable to manufacture 6,000 vehicles without parts from Yanfeng, the lawsuit says......»»
Exploit seller wants $2 million for a zero-day iMessage attack vector that probably doesn"t exist
A $2 million iMessage exploit listed on the dark web probably doesn't do what the sellers say that it does, but it's still a reminder that iPhones aren't hack-proof.iMessage on iPhoneAccording to a post on X made on April 15, Trust Wallet has found c.....»»