Cybersecurity Compliance

Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto

[ad_1] A recent research study has shed light on the decade-long activities of a Romanian cyber threat group known as RUBYCARP, which uses techniques such as cryptocurrency mining and phishing. One of the key findings from the technical write-up, published by Sysdig today, is the group’s use of a script capable of simultaneously deploying multiple …

Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto Read More »

Change Healthcare Hit By Cyber Extortion Again

[ad_1] Change Healthcare, a subsidiary of UnitedHealth Group, has been facing renewed extortion from cybercriminals just a month after paying a ransom to prevent the release of data stolen in a February 2024 ransomware attack.  The attack, orchestrated by the ALPHV/BlackCat ransomware gang, severely disrupted healthcare operations across the US, compromising over 4TB of sensitive data, …

Change Healthcare Hit By Cyber Extortion Again Read More »

Hackers Use Malware to Hunt Software Vulnerabilities

[ad_1] Many threat actors are turning to malware to scan software vulnerabilities that they can use in future cyber-attacks. Security researchers at Unit 42, the threat intelligence branch of cybersecurity provider Palo Alto Networks, discovered a significant number of malware-initiated scans among the scanning attacks they detected in 2023. Traditional Vulnerability Scanning Explained Vulnerability scanning …

Hackers Use Malware to Hunt Software Vulnerabilities Read More »

Foreign Interference Drives Record Surge in IP Theft

[ad_1] Hostile foreign states are behind a surge in malicious insider breaches, driving IP theft and industrial espionage to an all-time high, according to DTEX. The insider threat specialist analyzed over 1300 investigations across its global customer base to compile the 2024 i3 Insider Risk Investigations Report – Foreign Interference. It claimed to have recorded a …

Foreign Interference Drives Record Surge in IP Theft Read More »

Why Identity Management is Key in a Cyber Resilience Strategy

[ad_1] Identity compromise is one of the top cyber threats to organizations, prompting cybersecurity professionals to encourage better identity management hygiene across industries. According to the Identity Defined Security Alliance (IDSA), almost nine out of ten businesses (84%) have experienced an identity-related breach over the past year, and 78% have experienced direct business impacts from …

Why Identity Management is Key in a Cyber Resilience Strategy Read More »

New Malware “Latrodectus” Linked to IcedID

[ad_1] Cybersecurity researchers have identified a new loader named “Latrodectus,” discovered in November 2023, which has since been associated with nearly a dozen campaigns since February 2024. This malware, described in an advisory published by Proofpoint last Thursday, was primarily utilized by actors identified as initial access brokers (IABs) and functions as a downloader with …

New Malware “Latrodectus” Linked to IcedID Read More »

Byakugan Infostealer Capabilities Revealed – Infosecurity Magazine

[ad_1] New research has shed light on the intricate workings of the Byakugan malware, initially detected in January. During an investigation into a campaign featuring malware concealed within PDFs, the FortiGuard Labs team unearthed additional insights about the malware. Last Thursday, they issued an advisory spotlighting Byakugan’s infostealer capabilities. According to the technical write-up, Byakugan’s …

Byakugan Infostealer Capabilities Revealed – Infosecurity Magazine Read More »

US Federal Data Privacy Law Introduced by Legislators

[ad_1] A bipartisan US federal data protection law has been drafted by two US lawmakers, aiming to codify and enforce privacy rights for all US citizens. Congresswoman Cathy McMorris Rodgers (R-WA 5th District) who is the House Committee on Energy and Commerce Chair, and Senator Maria Cantwell (D-WA), the Senate Committee on Commerce, Science and …

US Federal Data Privacy Law Introduced by Legislators Read More »

Famous YouTube Channels Hacked to Distribute Infostealers

[ad_1] Threat actors increasingly utilize YouTube to distribute information stealer malware (infostealers) by appropriating legitimate channels as well as using their own video channels. In a new report, the AhnLab Security Intelligence Center (ASEC) found a growing number of cases in which malicious actors steal famous YouTube channels and repurpose them to distribute infostealers like …

Famous YouTube Channels Hacked to Distribute Infostealers Read More »

Scroll to Top