New coercive tactics used to extort ransomware payments
The increase in reported ransomware victims across Q1 2023 reflects the continued prevalence of ransomware as a worldwide, industry agnostic threat, according to GuidePoint Security. The report is based on data obtained from publicly available resour.....»»
Tietoevry ransomware attack halts Swedish organizations
Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack w.....»»
Elizabeth Holmes barred from federal health programs for 90 years
The former Theranos CEO is barred from receiving payments from federal health program. Theranos CEO and founder Elizabeth Holmes. (credit: Max Morse for TechCrunch) Elizabeth Holmes—the disgraced and incarcerated foun.....»»
Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot
Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning. The attackers asks for a small sum to return / not publish the data, but those who.....»»
Ransomware negotiation: When cybersecurity meets crisis management
In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do, when to do it, who is notifi.....»»
Apple lets devs use alternate in-app payment options, still takes commissions
Devs must ask permission to use 3rd-party payments, and Apple still wants a cut. Enlarge (credit: Getty Images | NurPhoto) A chapter in the ongoing Epic v. Apple court case closed yesterday when the US Supreme Court decl.....»»
Bonus second round of AppleCare settlement payments being sent out, here’s why
Back in 2022, Apple began sending customers payments after settling a long-running class action lawsuit over its AppleCare replacement devices. As it happens, the $95 million settlement isn’t done yet as a second round of payments is being sent now.....»»
Climate denialists find new ways to monetize disinformation on YouTube
Majority of climate-denial content posted now does not violate YouTube's policy. Enlarge (credit: PM Images | DigitalVision) Content creators have spent the past five years developing new tactics to evade YouTube's polic.....»»
Extreme weather influences mortgage payments, study finds
When cyclones and floods hit populated areas, people's ability to pay their mortgage differs depending on the type and intensity of the extreme weather, research suggests......»»
Lush confirms it was hit by a cyberattack - but it isn"t saying much else
The company isn't sharing any details just yet, but some reports are speculating it suffered a ransomware attack......»»
Trellix XDR Platform for RDR strengthens operational resilience
Trellix announced Trellix XDR Platform for Ransomware Detection and Response (RDR), available immediately worldwide. Trellix XDR Platform for RDR provides visibility across an organization’s entire security ecosystem and delivers critical coverage.....»»
Trellix XDR Platform for RDR strengthens operational resilience for customers
Trellix announced Trellix XDR Platform for Ransomware Detection and Response (RDR), available immediately worldwide. Trellix XDR Platform for RDR provides visibility across an organization’s entire security ecosystem and delivers critical coverage.....»»
Akira ransomware attackers are wiping NAS and tape backups
“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 re.....»»
The return of student loan payments could strain young buyers
During the repayment pause, 36 percent of consumers with student loans took on an automotive loan......»»
Embracing offensive cybersecurity tactics for defense against dynamic threats
In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. What are the critical steps in creat.....»»
Hackers are targeting exposed MS SQL servers with Mimic ransomware
Hackers are brute-forcing exposed MS SQL database servers to deliver Mimic ransomware, Securonix researchers are warning. About Mimic ransomware Mimic ransomware was first spotted in the wild in June 2022 and analyzed by Trend Micro researchers in Ja.....»»
Even wireless tools aren"t safe from ransomware attacks
Researchers found multiple vulnerabilities on intranet-connected wrenches......»»
Fake "hack-back" offers are putting ransomware victims at further risk
Fraudsters are now going after ransomware victims, offering to return stolen data for a price - but surprise surprise, it's a scam......»»
“Security researcher” offers to delete data stolen by ransomware attackers
When organizations get hit by ransomware and pay the crooks to decrypt the encrypted data and delete the stolen data, they can never be entirely sure the criminals will do as they promised. And even if an organization gets its data decrypted, they ca.....»»
Hackers can infect network-connected wrenches to install ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»
Network-connected wrenches in factories can be hacked for sabotage or ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»