CISA updates Conti ransomware alert with nearly 100 domain names
The federal agency notes that while the domains have been used in malicious operations, some of them may be abandoned or may share similar characteristics coincidentally.
The federal agency notes that while the domains have been used in malicious operations, some of them may be abandoned or may share similar characteristics coincidentally.
Security researchers discovered DDoS ransomware actors, impersonating REvil, to extort from targeted companies and also impact their stock prices. A day after the attacks, the attackers sent 15 million requests to the same site with a new message that warned the CEO to tank the company’s stock price by hundreds of show more ...
The relatively unknown Nokoyawa ransomware is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps.
To guard against the attacks, SingCert urged the public to practice good cyber hygiene habits like checking links before clicking on them and verifying attachments before downloading them.
First observed in 2019, JSSLoader is used by the GOLD NIAGARA cybercrime group. An Excel add-in extends Excel functionality, typically uses the '.xll' file extension, and functions similar to a DLL.
The group pledges to put security first by sharing their security information proactively with their customers using a Whistic Profile and invites all companies to do the same.
A new report reveals that organizations are still taking nearly two months to remediate critical risk vulnerabilities, with the average mean time to remediate (MTTR) across the full stack set at 60 days.
The Emotet botnet, which returned in November 2021 after a 10-month-long hiatus, is once again growing steadily, amassing a swarm of over 100,000 infected hosts for perpetrating its malicious activities.
According to CERT-UA, the malware campaign bears similarities to the activities of the UAC-0051 threat group, also known as ‘unc1151’, which according to Mandiant has links to the Belarussian government.
Since March 1, two phishing campaigns have been using the war theme to gain remote access, perform network reconnaissance, pilfer sensitive information, disable security software, and make space for further payloads.
Google’s TAG warned several Gmail users of being targeted in phishing campaigns performed by a Chinese hacking group. The warnings came after Gmail’s defenses automatically blocked the emails.
The notorious hacker group, calling itself “Lapsus$,” claims to have obtained roughly 200 Gb of source code files, allegedly representing approximately 5,000 GitHub repositories.
Security experts have spotted an interesting case of a suspected ransomware attack that employed custom-made tools typically used by APT (advanced persistent threat) groups.
Patchstack, a leader in WordPress security and threat intelligence, has released a whitepaper to present the state of WordPress security in 2021, and the report paints a dire picture.
Websites of some Russian federal agencies were compromised in a supply chain attack on Tuesday after unknown attackers hacked the stats widget used to track the number of visitors by multiple government agencies
Yaroslav Vasinskyi, a Ukrainian national, linked to the Russia-based REvil ransomware group has been extradited to the U.S. to face charges for his role in carrying out the file-encrypting malware attacks against several companies.
Brittany Allen at Sift says the scams fall into three buckets: Users pretending to be in need of donations, users pretending to be companies collecting donations, and offers to help others create fake donation websites.
The funding round was led by More Provident and Pension Funds and REV Venture Partners, with additional participation from CrowdStrike, Elron Ventures, OurCrowd, and SonaeIM.
The messages generally contain brief text content, followed by a link to download a zip archive. These links may be “bare URLs” like above, or hot-linked text in the message body.
Software firm HelpSystems continues on its cybersecurity buying spree, announcing on Wednesday that it has agreed to acquire Alert Logic, a provider of managed detection and response (MDR) services.
The notoriety of the Conti ransomware group has come under the spotlight as the CISA shared an alert with IoCs consisting of close to 100 domain names. Organizations should follow mitigation strategies and recommendations provided in the alert. Besides, security admins can use provided IOCs for better detection of threats.
Avast researchers came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses.
The Iranian state-sponsored threat actor MuddyWater has been attributed to a new swarm of attacks targeting Turkey and the Arabian Peninsula with the goal of deploying RATs on compromised systems.
This Metasploit module exploits a vulnerability that has been in the Linux kernel since version 5.8. It allows writing of read only or immutable memory. The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102. The module exploits this vulnerability by overwriting a suid binary with the payload, executing show more ...
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
Zabbix version 5.0.17 authenticated remote code execution exploit.
Siemens S7-1200 versions 4.5 and below have an unauthenticated CPU start/stop command vulnerability.
Ubuntu Security Notice 5320-1 - USN-5288-1 fixed several vulnerabilities in Expat. For CVE-2022-25236 it caused a regression and an additional patch was required. This update address this regression and several other vulnerabilities. It was discovered that Expat incorrectly handled certain files. An attacker could show more ...
WOW21 version 5.0.1.9 suffers from an unquoted service path vulnerability.
Sandboxie-Plus version 5.50.2 suffers from an unquoted service path vulnerability.
McAfee Safe Connect VPN suffers from an unquoted service path vulnerability.
BattlEye version 0.9 suffers from an unquoted service path vulnerability.
Sony Playmemories Home suffers from an unquoted service path vulnerability.
The insidious Emotet botnet, which staged a return in November 2021 after a 10-month-long hiatus, is once again exhibiting signs of steady growth, amassing a swarm of over 100,000 infected hosts for perpetrating its malicious activities. "While Emotet has not yet attained the same scale it once had, the botnet is showing a strong resurgence with a total of approximately 130,000 unique bots
Yaroslav Vasinskyi, a Ukrainian national, linked to the Russia-based REvil ransomware group has been extradited to the U.S. to face charges for his role in carrying out the file-encrypting malware attacks against several companies, including Kaseya last July. The 22-year-old had been previously arrested in Poland in October 2021, prompting the U.S. Justice Department (DoJ) to file charges of
Researchers have disclosed a new technique that could be used to circumvent existing hardware mitigations in modern processors from Intel, AMD, and Arm and stage speculative execution attacks such as Spectre to leak sensitive information from host memory. Attacks like Spectre are designed to break the isolation between different applications by taking advantage of an optimization technique
The Iranian state-sponsored threat actor known as MuddyWater has been attributed to a new swarm of attacks targeting Turkey and the Arabian Peninsula with the goal of deploying remote access trojans (RATs) on compromised systems. "The MuddyWater supergroup is highly motivated and can use unauthorized access to conduct espionage, intellectual property theft, and deploy ransomware and destructive
The FBI has warned that the Ragnar Locker gang has infected at least 52 critical infrastructure organisations across America with its ransomware. Read more in my article on the Tripwire State of Security blog.
No - there aren't women in Ukraine are keen to have a sexy webcam chat with you right now.
The most famous policeman in Nigeria is in hot water over his links to Hushpuppi, has your Amazon Echo been talking to itself, and can an AI girlfriend save your marriage? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans show more ...