Operators of the malware will most probably try and infect as many systems as possible with it — both inside and outside Ukraine — to make their DDoS attacks more powerful. Another indication is a sharp increase in phishing attacks out of Russia over the past 24 hours that already have affected some organizations in […]
Cyber attacks against European companies and public authorities are on the rise, according to the European Cybersecurity Agency (ENISA) and the Computer Emergency Response Team for EU Agencies (CERT-EU). According to both parties, the increase can be explained by the threat of ransomware, cybercriminals are increasingly financially motivated and there is an exponential increase in […]
Several Ukrainian government websites down due to a major a cyberattack. Below is the websites reads in part: “Ukrainians!…All information about you has become public, be afraid and expect worse.” According to the New York Times, the attack also crippled the sites of the cabinet of ministers, along with the ministries of energy, sports, agriculture, […]
Criminals have managed to hijack 1.1 million accounts at 17 companies by means of reused passwords, says New York Attorney General Letitia James. According to James, the accounts could be taken over through credential stuffing attacks. Credential stuffing uses previously leaked email addresses and passwords to gain automated access to accounts. Attackers check whether they […]
A recently discovered FBI training document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.
Do you want to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attack?Don’ts:1.) Don’t give everything easily to the attacker, make it harder for him to get. (Control Measures in the network)2.) Don’t enable legitimate vulnerable application if not in use, attackers always use legit applications in the network. (Abuse […]
Internet of Things devices offered in the European Union will no longer be allowed to use standard passwords from mid-2024. Instead, users must set a strong password before first use, the European Commission has determined. It must also become easier to update IoT devices, they must be tested for vulnerabilities and stored personal and financial […]
Microsoft revealed new malware capable of transmitting sensitive information from a compromised AD FS server as well as receive and execute additional malicious payloads retrieved from a remote attacker-controlled server. This malware can also monitor all incoming HTTP GET and POST requests sent to the server from the intranet (or internet) and intercept HTTP requests […]
Organizations find it difficult to prepare for a ransomware attack. Reason for Microsft to share three steps that help prevent ransomware.1. Set up a recovery plan where no ransom is paid. Organizations must, among other things, map and backup their important data and systems, protect the backups and perform recovery tests with all systems offline. […]
The US Department of Justice has indicted a man for using a malware botnet to brute force 2.000 computer logon credentials per week and then selling them on a criminal dark web remote access marketplace.