UK police have arrested a 17-year-old boy from Walsall in connection with a notorious cyber hacking group. This group has targeted significant organizations worldwide, including MGM Resorts in the United States, with sophisticated ransomware attacks. Arrest Made in Coordinated Effort…
Category: EN
UK police arrested a 17-year-old linked to the Scattered Spider gang
Law enforcement arrested a 17-year-old boy from Walsall, U.K., for suspected involvement in the Scattered Spider cybercrime syndicate. Law enforcement in the U.K. arrested a 17-year-old teenager from Walsall who is suspected to be a member of the Scattered Spider cybercrime…
Fake CrowdStrike Fixes Target Companies With Malware, Data Wipers
Malicious campaigns have emerged, including one targeting BBVA bank customers with a fake CrowdStrike Hotfix that installs remote access tools. Another attack involves a data wiper distributed under the guise of a CrowdStrike update. This article has been indexed from…
Experts Expect Ransomware Surge After Police Disruption
Security firm predicts rise in ransomware activity in second half of year as gangs recover from LockBit takedown, AlphV scam This article has been indexed from Silicon UK Read the original article: Experts Expect Ransomware Surge After Police Disruption
A week in security (July 15 – July 21)
A list of topics we covered in the week of July 15 to July 21 of 2024 This article has been indexed from Malwarebytes Read the original article: A week in security (July 15 – July 21)
SocGholish Malware Exploits BOINC Project for Covert Cyberattacks
The JavaScript downloader malware known as SocGholish (aka FakeUpdates) is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC. BOINC, short for Berkeley Open Infrastructure Network Computing Client, is an…
Our Shared Responsibility: Africa’s Cybersecurity Imperative
We have a shared responsibility to embed cybersecurity at the core of our digital strategies, and we look forward to the opportunity to enhance cyber resilience in Africa—a continent on the brink of a remarkable digital transformation. This article has…
CISA Says Malicious Hackers are ‘Taking Advantage’ of CrowdStrike Outage
The U.S. cybersecurity agency CISA warned against clicking on suspicious links to prevent email compromise. Cybercriminals are already impersonating CrowdStrike in phishing emails, asking for payment to “fix the CrowdStrike apocalypse.” This article has been indexed from Cyware News –…
China Claims Volt Typhoon was a False Flag Inside Job Conspiracy
Beijing has claimed that the Volt Typhoon attack gang, accused by Five Eyes nations of being a Beijing-backed threat to critical infrastructure, was actually fabricated by the US intelligence community. This article has been indexed from Cyware News – Latest…
Worst Cyber Event in History: CrowdStrike Update Causes Global Chaos. Cyber Security Today Special Edition for Monday, July 22, 2024
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon…
Microsoft 2024 Windows IT meltdown impacts about 8.5 million devices
The recent update to CrowdStrike Falcon sensor software has caused widespread issues, leading to the infamous BSOD “blue screen of death” on over 8.2 million Windows OS devices globally. Despite initial fears of a cyber attack, experts indicate this incident…
How to Negotiate Ransomware Attacks: A Strategic Guide
In an increasingly digital world, ransomware attacks have become a prevalent threat to businesses and individuals alike. These malicious attacks involve cyber-criminals encrypting data or locking users out of their systems, demanding payment (often in cryptocurrency) to restore access. While…
Media Briefing: EFF, Partners Warn UN Member States Are Poised to Approve Dangerous International Surveillance Treaty
Countries That Believe in Rule of Law Must Push Back on Draft That Expands Spying Powers, Benefiting Authoritarian Regimes < div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> SAN FRANCISCO—On Wednesday, July 24, at 11:00 am…
New Linux Variant of Play Ransomware Targeting VMware ESXi Systems
Cybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that’s designed to target VMware ESXi environments. “This development suggests that the group could be broadening its attacks across the Linux…
Media Briefing: EFF, Partners Warn UN Member States are Poised to Approve Dangerous International Surveillance Treaty
Countries That Believe in Rule of Law Must Push Back on Draft that Expands Spying Powers, Benefiting Authoritarian Regimes < div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> SAN FRANCISCO—On Wednesday, July 24, at 11:00 am…
Cross-industry standards for data provenance in AI
In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models’ performance and reliability. Jesani highlights the collaborative process behind…
New Linux Variant of Play Ransomware Targeting VMWare ESXi Systems
Cybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that’s designed to target VMWare ESXi environments. “This development suggests that the group could be broadening its attacks across the Linux…
CIA AI director Lakshmi Raman claims the agency is taking a ‘thoughtful approach’ to AI
As a part of TechCrunch’s ongoing Women in AI series, which seeks to give AI-focused women academics and others their well-deserved — and overdue — time in the spotlight, TechCrunch interviewed Lakshmi Raman, the director of AI at the CIA. We talked…
Cellebrite got into Trump shooter’s Samsung device in just 40 minutes
Also: Second-string Russian hackers sanctioned; Senators demand answers from Snowflake, and more Infosec in brief Unable to access the Samsung smartphone of the deceased Trump shooter for clues, the FBI turned to a familiar – if controversial – source to…
Cyber insurance 2.0: The systemic changes required for future security
Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, discusses how cyber insurance…