Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

The Week in Ransomware – May 17th 2024 – Mailbombing is back – Source: www.bleepingcomputer.com

the-week-in-ransomware-–-may-17th-2024-–-mailbombing-is-back-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Lawrence Abrams This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums data theft forum. However, that does not mean there was nothing of interest released this week about ransomware. A report by CISA said that the Black Basta ransomware oepration […]

La entrada The Week in Ransomware – May 17th 2024 – Mailbombing is back – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft to start enforcing Azure multi-factor authentication in July – Source: www.bleepingcomputer.com

microsoft-to-start-enforcing-azure-multi-factor-authentication-in-july-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Starting in July, Microsoft will begin gradually enforcing multi-factor authentication (MFA) for all users signing into Azure to administer resources. After first completing the rollout for the Azure portal, the MFA enforcement will see a similar rollout for CLI, PowerShell, and Terraform. Redmond says customers will also receive additional […]

La entrada Microsoft to start enforcing Azure multi-factor authentication in July – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

SEC: Financial orgs have 30 days to send data breach notifications – Source: www.bleepingcomputer.com

sec:-financial-orgs-have-30-days-to-send-data-breach-notifications-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The Securities and Exchange Commission (SEC) has adopted amendments to Regulation S-P that require certain financial institutions to disclose data breach incidents to impacted individuals within 30 days of discovery. Regulation S-P was introduced in 2000 and controls how some financial entities must treat nonpublic personal information belonging to […]

La entrada SEC: Financial orgs have 30 days to send data breach notifications – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

US arrests suspects behind $73M ‘pig butchering’ laundering scheme – Source: www.bleepingcomputer.com

us-arrests-suspects-behind-$73m-‘pig-butchering’-laundering-scheme-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​The U.S. Department of Justice charged two suspects for allegedly leading a crime ring that laundered at least $73 million from cryptocurrency investment scams, also known as “pig butchering.” In pig butchering scams, criminals approach targets using various messaging apps, dating platforms, or social media platforms to build trust […]

La entrada US arrests suspects behind $73M ‘pig butchering’ laundering scheme – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

WebTPA data breach impacts 2.4 million insurance policyholders – Source: www.bleepingcomputer.com

webtpa-data-breach-impacts-24-million-insurance-policyholders-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The WebTPA Employer Services (WebTPA) data breach disclosed earlier this month is impacting close to 2.5 million individuals, the U.S. Department of Health and Human Services notes. Some of the impacted people are customers at large insurance companies such as The Hartford, Transamerica, and Gerber Life Insurance. WebTPA is a GuideWell […]

La entrada WebTPA data breach impacts 2.4 million insurance policyholders – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

US woman allegedly aided North Korean IT workers infiltrate 300 firms – Source: www.bleepingcomputer.com

us-woman-allegedly-aided-north-korean-it-workers-infiltrate-300-firms-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​The U.S. Justice Department charged five individuals today, a U.S. Citizen woman, a Ukrainian man, and three foreign nationals, for their involvement in cyber schemes that generated revenue for North Korea’s nuclear weapons program. They were allegedly involved between October 2020 and October 2023 in a campaign coordinated by […]

La entrada US woman allegedly aided North Korean IT workers infiltrate 300 firms – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Yesterday — 17 May 2024Main stream

Five charged for cyber schemes to benefit North Korea’s weapons program – Source: www.bleepingcomputer.com

five-charged-for-cyber-schemes-to-benefit-north-korea’s-weapons-program-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​The U.S. Justice Department charged five individuals today, a U.S. Citizen woman, a Ukrainian man, and three foreign nationals, for their involvement in cyber schemes that generated revenue for North Korea’s nuclear weapons program. They were allegedly involved between October 2020 and October 2023 in a campaign coordinated by […]

La entrada Five charged for cyber schemes to benefit North Korea’s weapons program – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Norway recommends replacing SSL VPN to prevent breaches – Source: www.bleepingcomputer.com

norway-recommends-replacing-ssl-vpn-to-prevent-breaches-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The Norwegian National Cyber Security Centre (NCSC) recommends replacing SSLVPN/WebVPN solutions with alternatives due to the repeated exploitation of related vulnerabilities in edge network devices to breach corporate networks. The organization recommends that the transition be completed by 2025, while organizations subject to the ‘Safety Act’ or those in critical […]

La entrada Norway recommends replacing SSL VPN to prevent breaches – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft shares temp fix for Outlook encrypted email reply issues – Source: www.bleepingcomputer.com

microsoft-shares-temp-fix-for-outlook-encrypted-email-reply-issues-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Microsoft has shared a temporary fix for a known issue preventing Microsoft 365 customers from replying to encrypted emails using the Outlook Desktop client. This confirms customer reports regarding these issues when using the classic Outlook clients shared on Microsoft’s community website in recent months. According to online reports, […]

La entrada Microsoft shares temp fix for Outlook encrypted email reply issues – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

MediSecure e-script firm hit by ‘large-scale’ ransomware data breach – Source: www.bleepingcomputer.com

medisecure-e-script-firm-hit-by-‘large-scale’-ransomware-data-breach-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Electronic prescription provider MediSecure in Australia has shut down its website and phone lines following a ransomware attack believed to originate from a third-party vendor. The incident has impacted personal and health information of individuals but the extent remains unclear at this time. Operating since 2009, MediSecure provides digital […]

La entrada MediSecure e-script firm hit by ‘large-scale’ ransomware data breach – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Russian hackers use new Lunar malware to breach a European govt’s agencies – Source: www.bleepingcomputer.com

russian-hackers-use-new-lunar-malware-to-breach-a-european-govt’s-agencies-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Security researchers discovered two previously unseen backdoors dubbed LunarWeb and LunarMail that were used to compromise a European government’s diplomatic institutions abroad. The pieces of malware have been used to breach the Ministry of Foreign Affairs of a European country with diplomatic missions in the Middle East and have been active since […]

La entrada Russian hackers use new Lunar malware to breach a European govt’s agencies – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft: Windows Server 2019 updates fail with 0x800f0982 errors – Source: www.bleepingcomputer.com

microsoft:-windows-server-2019-updates-fail-with-0x800f0982-errors-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Microsoft has acknowledged a new known issue causing this month’s KB5037765 security update for Windows Server 2019 to fail to install with 0x800f0982 errors. “Windows servers attempting to install the May 2024 security update (KB5037765), released May 14, 2024, might face issues during the installation process,” Microsoft explains on […]

La entrada Microsoft: Windows Server 2019 updates fail with 0x800f0982 errors – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Kimsuky hackers deploy new Linux backdoor in attacks on South Korea – Source: www.bleepingcomputer.com

kimsuky-hackers-deploy-new-linux-backdoor-in-attacks-on-south-korea-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The North Korean hacker group Kimsuki has been using a new Linux malware called Gomir that is a version of the GoBear backdoor delivered via trojanized software installers. Kimsuky is a state-sponsored threat actor linked to North Korea’s military intelligence, the Reconnaissance General Bureau (RGB). In early February 2024, researchers […]

La entrada Kimsuky hackers deploy new Linux backdoor in attacks on South Korea – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Before yesterdayMain stream

Google fixes third actively exploited Chrome zero-day in a week – Source: www.bleepingcomputer.com

google-fixes-third-actively-exploited-chrome-zero-day-in-a-week-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Google has released a new emergency Chrome security update to address the third zero-day vulnerability exploited in attacks within a week. “Google is aware that an exploit for CVE-2024-4947 exists in the wild,” the search giant said in a security advisory published on Wednesday. The high-severity zero-day vulnerability (CVE-2024-4947) […]

La entrada Google fixes third actively exploited Chrome zero-day in a week – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Android to add new anti-theft and data protection features – Source: www.bleepingcomputer.com

android-to-add-new-anti-theft-and-data-protection-features-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Google is introducing multiple anti-theft and data protection features later this year, some available only for Android 15+ devices, while others will roll out to billions of devices running Android 10 and later. To protect your personal and sensitive data if your device is stolen or lost, a new […]

La entrada Android to add new anti-theft and data protection features – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Android 15, Google Play Protect get new anti-malware and anti-fraud features – Source: www.bleepingcomputer.com

android-15,-google-play-protect-get-new-anti-malware-and-anti-fraud-features-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Lawrence Abrams Today, Google announced new security features coming to Android 15 and Google Play Protect that will help block scams, fraud, and malware apps on users’ devices. Announced at Google I/O 2024, the new features are designed not only to help end users but also to warn developers when their apps have been tampered with. “Today, we’re announcing […]

La entrada Android 15, Google Play Protect get new anti-malware and anti-fraud features – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Nissan North America data breach impacts over 53,000 employees – Source: www.bleepingcomputer.com

nissan-north-america-data-breach-impacts-over-53,000-employees-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Nissan North America (Nissan) suffered a data breach last year when a threat actor targeted the company’s external VPN and shut down systems to receive a ransom. The car maker discovered the breach in early November 2023 and discovered recently that the incident exposed personal data belonging to more […]

La entrada Nissan North America data breach impacts over 53,000 employees – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Brothers arrested for $25 million theft in Ethereum blockchain attack – Source: www.bleepingcomputer.com

brothers-arrested-for-$25-million-theft-in-ethereum-blockchain-attack-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​The U.S. Department of Justice has indicted two brothers for allegedly manipulating the Ethereum blockchain and stealing $25 million worth of cryptocurrency within approximately 12 seconds in a “first-of-its-kind” scheme. Anton Peraire-Bueno and James Pepaire-Bueno were arrested in Boston and New York on Tuesday on charges of wire fraud […]

La entrada Brothers arrested for $25 million theft in Ethereum blockchain attack – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Apple blocked $7 billion in fraudulent App Store purchases in 4 years – Source: www.bleepingcomputer.com

apple-blocked-$7-billion-in-fraudulent-app-store-purchases-in-4-years-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Apple’s antifraud technology has blocked more than $7 billion in potentially fraudulent transactions in four years, the company states in its latest annual fraud prevention analysis. From 2020 through 2023, the company also detected more than 14 million stolen cards and blocked them from transacting on its platform along with […]

La entrada Apple blocked $7 billion in fraudulent App Store purchases in 4 years – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Windows Quick Assist abused in Black Basta ransomware attacks – Source: www.bleepingcomputer.com

windows-quick-assist-abused-in-black-basta-ransomware-attacks-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Financially motivated cybercriminals abuse the Windows Quick Assist feature in social engineering attacks to deploy Black Basta ransomware payloads on victims’ networks. Microsoft has been investigating this campaign since at least mid-April 2024, and, as they observed, the threat group (tracked as Storm-1811) started their attacks by email bombing […]

La entrada Windows Quick Assist abused in Black Basta ransomware attacks – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

FBI seize BreachForums hacking forum used to leak stolen data – Source: www.bleepingcomputer.com

fbi-seize-breachforums-hacking-forum-used-to-leak-stolen-data-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Lawrence Abrams The FBI has seized the notorious BreachForums hacking forum used to leak and sell stolen corporate data to other cybercriminals. The seizure occurred on Wednesday morning, soon after the site was used last week to leak data stolen from a Europol law enforcement portal. The website is now displaying a message stating […]

La entrada FBI seize BreachForums hacking forum used to leak stolen data – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Banco Santander warns of a data breach exposing customer info – Source: www.bleepingcomputer.com

banco-santander-warns-of-a-data-breach-exposing-customer-info-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Banco Santander S.A. announced it suffered a data breach impacting customers after an unauthorized actor accessed a database hosted by one of its third-party service providers. With a strong presence in Spain, the United Kingdom, Brazil, Mexico, and the United States, Banco Santander is one of the largest and most significant banks […]

La entrada Banco Santander warns of a data breach exposing customer info – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Tornado Cash cryptomixer dev gets 64 months for laundering $2 billion – Source: www.bleepingcomputer.com

tornado-cash-cryptomixer-dev-gets-64-months-for-laundering-$2-billion-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Alexey Pertsev, one of the main developers of the Tornado Cash cryptocurrency tumbler has been sentenced to 64 months in prison for his part in helping launder more than $2 billion worth of cryptocurrency. The 31-year-old Russian national was arrested in Amsterdam in August 2022 for charges of hiding financial flows from criminal […]

La entrada Tornado Cash cryptomixer dev gets 64 months for laundering $2 billion – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers – Source: www.bleepingcomputer.com

poc-exploit-released-for-rce-zero-day-in-d-link-exo-ax4800-routers-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port. The D-Link DIR-X4860 router is a high-performance Wi-Fi 6 router capable of speeds of up to 4800 Mbps and advanced features like OFDMA, […]

La entrada PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft fixes VPN failures caused by April Windows updates – Source: www.bleepingcomputer.com

microsoft-fixes-vpn-failures-caused-by-april-windows-updates-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Today, ​Microsoft fixed a known issue breaking VPN connections across client and server platforms after installing the April 2024 Windows security updates. “Windows devices might face VPN connection failures after installing the April 2024 security update or the April 2024 non-security preview update,” Redmond explains on the Windows health […]

La entrada Microsoft fixes VPN failures caused by April Windows updates – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Singing River Health System: Data of 895,000 stolen in ransomware attack – Source: www.bleepingcomputer.com

singing-river-health-system:-data-of-895,000-stolen-in-ransomware-attack-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The Singing River Health System is warning that it is now estimating that 895,204 people are impacted by a ransomware attack it suffered in August 2023. Singing River Health System is a major healthcare provider located in Mississippi, operating the Singing River Hospital in Pascagoula, Ocean Springs Hospital, and the Singing River Gulfport […]

La entrada Singing River Health System: Data of 895,000 stolen in ransomware attack – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

PyPi package backdoors Macs using the Sliver pen-testing suite – Source: www.bleepingcomputer.com

pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas A new package mimicked the popular ‘requests’ library on the Python Package Index (PyPI) to target macOS devices with the Sliver C2 adversary framework, used for gaining initial access to corporate networks. Discovered by Phylum, the campaign involves several steps and obfuscation layers, including using steganography in a PNG image file to […]

La entrada PyPi package backdoors Macs using the Sliver pen-testing suite – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Apple backports fix for RTKit iOS zero-day to older iPhones – Source: www.bleepingcomputer.com

apple-backports-fix-for-rtkit-ios-zero-day-to-older-iphones-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Apple has backported security patches released in March to older iPhones and iPads, fixing an iOS Kernel zero-day tagged as exploited in attacks. In security advisories published today, Apple once again said they’re aware of reports that this vulnerability “may have been actively exploited.” The flaw is a memory […]

La entrada Apple backports fix for RTKit iOS zero-day to older iPhones – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

FCC reveals Royal Tiger, its first tagged robocall threat actor – Source: www.bleepingcomputer.com

fcc-reveals-royal-tiger,-its-first-tagged-robocall-threat-actor-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The Federal Communications Commission (FCC) has named its first officially designated robocall threat actor ‘Royal Tiger,’ a move aiming to help international partners and law enforcement more easily track individuals and entities behind repeat robocall campaigns. Royal Tiger, a group of bad actors operating from India, the United Kingdom, […]

La entrada FCC reveals Royal Tiger, its first tagged robocall threat actor – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

INC ransomware source code selling on hacking forums for $300,000 – Source: www.bleepingcomputer.com

inc-ransomware-source-code-selling-on-hacking-forums-for-$300,000-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas A cybercriminal using the name “salfetka” claims to be selling the source code of INC Ransom, a ransomware-as-a-service (RaaS) operation launched in August 2023. INC has previously targeted the U.S. division of Xerox Business Solutions (XBS), Yamaha Motor Philippines, and, more recently, Scotland’s National Health Service (NHS). Simultaneously with the alleged sale, the INC […]

La entrada INC ransomware source code selling on hacking forums for $300,000 – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Botnet sent millions of emails in LockBit Black ransomware campaign – Source: www.bleepingcomputer.com

botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Since April, millions of phishing emails have been sent through the Phorpiex botnet to conduct a large-scale LockBit Black ransomware campaign. As New Jersey’s Cybersecurity and Communications Integration Cell (NJCCIC) warned on Friday, the attackers use ZIP attachments containing an executable that deploys the LockBit Black payload, which encrypts the […]

La entrada Botnet sent millions of emails in LockBit Black ransomware campaign – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Hackers use DNS tunneling for network scanning, tracking victims – Source: www.bleepingcomputer.com

hackers-use-dns-tunneling-for-network-scanning,-tracking-victims-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Threat actors are using Domain Name System (DNS) tunneling to track when their targets open phishing emails and click on malicious links, and to scan networks for potential vulnerabilities. DNS tunneling is the encoding of data or commands that are sent and retrieved via DNS queries, essentially turning DNS, a fundamental network communication component, into a covert […]

La entrada Hackers use DNS tunneling for network scanning, tracking victims – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Helsinki suffers data breach after hackers exploit unpatched flaw – Source: www.bleepingcomputer.com

helsinki-suffers-data-breach-after-hackers-exploit-unpatched-flaw-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The City of Helsinki is investigating a data breach in its education division, which it discovered in late April 2024, impacting tens of thousands of students, guardians, and personnel. Though information about the attack was circulated on May 2, 2024, the city’s authorities shared more details in a press conference earlier […]

La entrada Helsinki suffers data breach after hackers exploit unpatched flaw – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Largest non-bank lender in Australia warns of a data breach – Source: www.bleepingcomputer.com

largest-non-bank-lender-in-australia-warns-of-a-data-breach-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Firstmac Limited is warning customers that it suffered a data breach a day after the new Embargo cyber-extortion group leaked over 500GB of data allegedly stolen from the firm. Firstmac is a significant player in Australia’s financial services industry, focusing primarily on mortgage lending, investment management, and securitization services. Headquartered in […]

La entrada Largest non-bank lender in Australia warns of a data breach – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

The Post Millennial hack leaked data impacting 26 million people – Source: www.bleepingcomputer.com

the-post-millennial-hack-leaked-data-impacting-26-million-people-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas Have I Been Pwned has added the information for 26,818,266 people whose data was leaked in a recent hack of The Post Millennial conservative news website. The Post Millennial is a conservative Canadian online news magazine belonging to the Human Events Media Group, which also operates the American ‘Human Events’ news platform. Earlier […]

La entrada The Post Millennial hack leaked data impacting 26 million people – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

CISA: Black Basta ransomware breached over 500 orgs worldwide – Source: www.bleepingcomputer.com

cisa:-black-basta-ransomware-breached-over-500-orgs-worldwide-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​CISA and the FBI said today that Black Basta ransomware affiliates breached over 500 organizations between April 2022 and May 2024. In a joint report published in collaboration with the Department of Health and Human Services (HHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the two federal […]

La entrada CISA: Black Basta ransomware breached over 500 orgs worldwide – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Europol confirms web portal breach, says no operational data stolen – Source: www.bleepingcomputer.com

europol-confirms-web-portal-breach,-says-no-operational-data-stolen-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​Europol, the European Union’s law enforcement agency, confirmed that its Europol Platform for Experts (EPE) portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only (FOUO) documents containing classified data. EPE is an online platform law enforcement experts use to “share […]

La entrada Europol confirms web portal breach, says no operational data stolen – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

The Week in Ransomware – May 10th 2024 – Chipping away at LockBit – Source: www.bleepingcomputer.com

the-week-in-ransomware-–-may-10th-2024-–-chipping-away-at-lockbit-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Lawrence Abrams After many months of taunting law enforcement and offering a million-dollar reward to anyone who could reveal his identity, the FBI and NCA have done just that, revealing the name of LockBitSupp, the operator of the LockBit ransomware operation. On February 19, Operation Cronos took down LockBit’s infrastructure and […]

La entrada The Week in Ransomware – May 10th 2024 – Chipping away at LockBit – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

❌
❌