Network SecurityCorrupted Microsoft Office documents used in phishing campaignThe corrupted files evade security systems but are easily recovered to deliver phishing links.
RansomwareCyberVolk analysis explores ransomware, hacktivism interconnectionsSeveral intertwined pro-Russia groups use their political stance to justify extorting governments.
Network SecurityNorth Korean IT worker scam linked to Chinese front companiesSentinelLabs reveals information on four previously unreported Chinese front companies taken down by the U.S. government Oct. 10.
Cloud SecurityFour takeaways for cloud practitioners from the Finastra breachHere are four lessons learned – and four takeaways from the Finastra breach.
RansomwareRussian women stepping up for cybercrime outfitsWomen are increasingly taking on top roles within Russian-speaking threat actor groups.
Data SecurityFBI and CISA warn of continued cyberattacks on US telecomsChina’s campaign against U.S. telecoms has been ongoing for years.
Cybersecurity daily newsRed red team team: Threat actors hire pentesters to test out ransomware effectivenessThreat actors are hiring freelance pentesters to improve the effectiveness of their ransomware attacks
RansomwareStoli Group USA files for bankruptcy after ransomware attackThe vodka distributor cited the cyberattack, legal battles with Russia and macroeconomic issues in its filing.
RansomwareUpstart SafePay ransomware group uses LockBit builder, claims 22 victimsHuntress researchers describe two SafePay ransomware incidents resulting in file encryption and exfiltration.
MalwareNorth Korea’s Lazarus observed testing new macOS trojan in the wildGroup-IB says the "RustyAttr" trojan could potentially be used in future attacks once the attackers make it more robust.
What security pros can learn from the bad information spread during this year’s election cycleJim RichbergOctober 8, 2024
Seven tips that offer short-term and long-term fixes following the CrowdStrike outageCallie Guenther July 19, 2024