0 Comments
Executive Summary  Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have seen recently with other major ransomware campaigns.  In our analysis, we observed that the attackers had access to the network before the infection and were able to collect specific information
0 Comments
Cyber attackers are actively setting their sights on unsecured SAP applications in an attempt to steal information and sabotage critical processes, according to new research. “Observed exploitation could lead in many cases to full control of the unsecured SAP application, bypassing common security and compliance controls, and enabling attackers to steal sensitive information, perform financial
0 Comments
Cyber-criminals behind a cyber-attack on a Florida school district are demanding a ransom payment of $40m in cryptocurrency.  The computer system of Broward County Public Schools was compromised at the beginning of March by data-locking ransomware in a Conti gang operation. The attack caused a system shutdown but left classes undisturbed.  Broward is the sixth-largest school district in
0 Comments
ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil ESET Research has been tracking a new banking trojan that has been targeting corporate users in Brazil since 2019 across many verticals affecting sectors such as engineering, healthcare, retail, manufacturing, finance, transportation, and government. This new threat, which we named
0 Comments
U.S. Department of Homeland Security Secretary Alejandro Mayorkas outlined broad Biden-Harris administration plans to strengthen and speed improvements in national cybersecurity defense at a pre-RSA Conference webinar. But, whether private enterprises will be able to rely on DHS for practical, tangible cybersecurity assistance remains an open question. The DHS cybersecurity strategy Mayorkas outlined consists of
0 Comments
The connection between cybersecurity and poet Ralph Waldo Emerson is not directly evident, however he once said, “money often costs too much.” This statement rings true across the financial services industry, as money is a key driver for cybercriminals acting with malicious intent. The always-on eye of Sauron on the financial services industry means there
0 Comments
The data is in. According to IBM Security’s 2020 Cost of a Data Breach Report, there is a 50% increase in cloud usage for enterprises across all industries. The number of threats targeting cloud services, predominantly collaboration services like Office 365,hasi ncreased 630%. Moreover, 75% of respondents report that discovery and recovery time from data
0 Comments
A septuagenarian pastor and retired educator living in Florida has been arrested for a second time on CSAM (child sexual abuse material) charges. Former Embry-Riddle Aeronautical University professor John Robert Griffin II was first arrested on January 6 on 30 felony charges of CSAM possession.  The Daytona Beach Police Department (DBPD) said 200 sexually explicit
0 Comments
Supreme Court Justice Clarence Thomas flaunted a dangerous ignorance regarding matters digital in an opinion published today. In attempting to explain the legal difficulties of social media platforms, particularly those arising from Twitter’s ban of Trump, he makes an ill-informed, bordering on bizarre, argument as to why such companies may need their First Amendment rights
0 Comments
The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response applications, is quickly becoming accepted by enterprises and embraced by Gartner analysts, because they “improve security operations productivity and enhance detection and response capabilities.”   It is less well known how these tools align
0 Comments
In what’s likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free. The leaked data includes full names, Facebook IDs, mobile numbers, locations, email addresses, gender, occupation, city, country, marital status broken, account creation date, and other
0 Comments
American multinational technology company Microsoft has been hit by its second outage in two weeks. Striking the company on April Fool’s Day, the substantial cloud outage knocked Microsoft’s Azure cloud services, Teams, Office 365, and OneDrive offline. Skype, Xbox Live, and Bing were also impacted. News of the outage began emanating from Twitter users at around 5pm ET yesterday.
0 Comments
Myth-busting Antivirus Assumptions The number of new viruses grows every day. In fact, McAfee recently registered a 605% increase in total Q2 COVID-19 themed threat detections, contributing to the millions already in existence. While there is no way to know when or how cyberattacks will occur, it’s clear that antivirus software is one of the best ways
0 Comments
Many enterprises rely on more than one security tool to protect their technology assets, devices, and networks. This is particularly true for organizations that use hybrid systems or a combination of cloud and local applications. Likewise, companies whose networks include a multitude of smartphones and IoT devices are likely to deploy multiple security solutions suitable
0 Comments
A cyber-bully has been fined for sending hateful messages to a professional wrestler before she took her own life. Japanese wrestler and Netflix reality show star Hana Kimura was just 22 years old when she killed herself on May 23 last year by inhaling toxic gas in her Tokyo home. Kimura became a target for internet trolls
0 Comments
Amazon kicked off the holiday weekend by backtracking slightly on a social media offensive that unfolded in the waning days of a historic unionization vote. The earlier  comments reportedly arrived as Jeff Bezos was pushing for a more aggressive strategy. Along with taking on Senators Bernie Sanders and Elizabeth Warren, the Amazon News Twitter account
0 Comments
Companies planning to use vaccine credentials to reopen offices will face a new challenge that will require an all-teams-on-deck approach — how to manage vaccination data. That’s according to Heidi Shey, principal analyst at Forrester Research and co-author of the report “The opportunity, the unknowns, and the risks of vaccine passports in the workplace,” which
0 Comments
A former intelligence analyst who was once a United States military service member has pleaded guilty to obtaining classified information and passing it to a reporter. Daniel Everette Hale served as an enlisted airman in the US Air Force from July 2009 to July 2013. After language and intelligence training, the 31-year-old from Nashville, Tennessee,