Black Basta Ransomware Attacks Linked to FIN7 Threat Actor
The hacker behind a tool used by Black Basta had access to the source code used by FIN7
Cyber News, Cyber Threat TrendsThe hacker behind a tool used by Black Basta had access to the source code used by FIN7
Cyber News, Cyber Threat TrendsThe group impersonated 19 law firms and debt collection agencies in the US, UK and Australia
Cyber News, Cyber Threat TrendsThe ransomware gang made the announcement on its leak site
Cyber News, Cyber Threat TrendsNot too long ago, there was a clear separation between the operational technology (OT) that drives the physical functions of a company – on the factory floor, for example – and the information technology (IT) that manages a company’s data to enable management and planning. As IT assets became increasingly connected to the outside world […]
Cyber News, Cyber Threat TrendsThe Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. “This group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions of Kavach multi-authentication (MFA) applications,” Zscaler ThreatLabz researcher Sudeep Singh said
Cyber News, Cyber Threat TrendsThe NSA (together with CISA) has published a long report on supply-chain security: “Securing the Software Supply Chain: Recommended Practices Guide for Suppliers.“: Prevention is often seen as the responsibility of the software developer, as they are required to securely develop and deliver code, verify third party components, and harden the build environment. But the […]
Cyber News, Cyber Threat TrendsThe proportion of cyber-attacks perpetrated by nation states targeting critical infrastructure jumped from 20% to 40%
Cyber News, Cyber Threat TrendsACM.101 Configuring network and host firewalls on home and business networks to allow SSH to an AWS IP address This is a continuation of my series on Automating Cybersecurity Metrics. In the last post, we deployed an EC2 instance configured with an EIP on AWS. Deploying an AWS Elastic IP Address If you’ve done that, now you […]
Cyber News, Cyber Threat TrendsUK regulator reduces penalty by 90%
Cyber News, Cyber Threat Trends