Category: EN

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target organizations in Italy. Google-owned Mandiant said the attacks single out multiple industries, including health, transportation, construction, and logistics. “UNC4990 operations generally involve…

Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware

A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that’s used to drop the open-source Sliver adversary simulation tool. The security vulnerabilities, tracked as CVE-2023-46805…

Citibank Sued For Failing to Protect Fraud Victims

New York attorney general launches legal case against Citi for failing to reimburse or protect fraud victims This article has been indexed from www.infosecurity-magazine.com Read the original article: Citibank Sued For Failing to Protect Fraud Victims

ICS and OT threat predictions for 2024

Kaspersky experts make their predictions about ICS and OT threats: specifically, ransomware and hacktivist attacks, threats to logistics and transportation, etc. This article has been indexed from Securelist Read the original article: ICS and OT threat predictions for 2024

Data leak at fintech giant Direct Trading Technologies

Sensitive data and trading activity of over 300K traders leaked online by international fintech firm Direct Trading Technologies. Direct Trading Technologies, an international fintech company, jeopardized over 300K traders by leaking their sensitive data and trading activity, thereby putting them…

10 Best User Access Review Software (2024)

With data breaches on the rise, it’s important to limit access to your organization’s sensitive data. A user access review software can help you do so.  This article provides you with a comprehensive overview of the 10 best User Access…

City Cyber Taskforce Launches to Secure Corporate Finance

A new initiative led by the ICAEW and NCSC launches today to improve cybersecurity during deals and investments This article has been indexed from www.infosecurity-magazine.com Read the original article: City Cyber Taskforce Launches to Secure Corporate Finance

Navigating TuxCare’s Enterprise Support for AlmaLinux

Get an additional 6 years of lifecycle support after the standard 10-year lifecycle   Includes automated live patching tools (KernelCare Enterprise and LibCare)   Enterprise-grade assistance for AlmaLinux and various open-source packages AlmaLinux is a popular Linux distribution among enterprises.…

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses not to encrypt…