Google Blows Lid Off Conti, Diavol Ransomware Access-Broker OpsResearchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizations’ networks for further malicious activity.
Franchises, partnerships emerge in Ransomware-as-a-Service operationsResearchers detail the movers and shakers in the space over 2021.
Defending the data center: The time to act is now
Cyberattacks against data centers may ultimately be everyone's problem – how prepared are their operators for the heightened risk of cyber-assaults?
The post Defending the data center: The time to act is now appeared first on WeLiveSecurity
Pro-Ukraine ‘Protestware’ Pushes Antiwar Ads, Geo-Targeted MalwareResearchers are tracking a number of open-source "protestware" projects on GitHub that have recently altered their code to display "Stand with Ukraine" messages for users, or basic facts about the carnage in Ukraine. The group also is tracking several code packages that were recently modified to erase files on computers that appear to be coming from Russian or Belarusian Internet addresses.
Dev Sabotages Popular NPM Package to Protest Russian InvasionIn the latest software supply-chain attack, the code maintainer added malicious code to the hugely popular node-ipc library to replace files with a heart emoji and a peacenotwar module.
Misconfigured Firebase Databases Exposing Data in Mobile AppsFive percent of the databases are vulnerable to threat actors: It's a gold mine of exploit opportunity in thousands of mobile apps, researchers say.
Reporting Mandates to Clear Up Feds’ Hazy Look into Threat Landscape – PodcastIt’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill. As it is, visibility into adversary behavior has been muck.
Russian Cyclops Blink botnet launches assault against Asus routersThe only option available might be a return to factory settings for infected routers.
Cloudflare debuts Friendly Bot validation serviceMachine learning is already used to "spot your bot."
Ex CafePress owner fined $500,000 for 'shoddy' security, covering up data breachWhen victim accounts were closed after being hacked in one incident, CafePress went so far as to charge them a $25 fee.
‘CryptoRom’ Crypto-Scam is Back via Side-Loaded AppsScammers are bypassing Apple's App Store security, stealing thousands of dollars’ worth of cryptocurrency from the unwitting, using the TestFlight and WebClips programs.
Another Destructive Wiper Targets Organizations in UkraineCaddyWiper is one in a barrage of data-wiping cyber-attacks to hit the country since January as the war on the ground with Russia marches on.
iPhone, Android users lose life savings to romance fraud, cryptocurrency operationAttackers now 'double dip' to clear out victim bank accounts.
US military vs. Silicon Valley – a cultural divide
The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture
The post US military vs. Silicon Valley – a cultural divide appeared first on WeLiveSecurity
Phony Instagram ‘Support Staff’ Emails Hit Insurance CompanyThe phishing scam tried to steal login credentials by threatening account shutdown, due to users having purportedly shared “fake content.”
Cyberattacks Against Israeli Government Sites: ‘Largest in the Country’s History’DDoS attacks against Israel telecom companies took down government sites, sparking a temporary state of emergency.
Paving the Way: Inspiring Women in Payments - A Q&A featuring Helena Shi
Inspired by the Global Chief Information Officer at one of the world’s largest global investment management companies – who was also a mother of three – Helena Shi realized that it was possible to balance motherhood and have a successful career. In fact, a week after giving birth to her baby, Helena completed her PCI QSA requalification and negotiated a work-from-home environment because her career was equally as important to her. In this edition of our blog, Helena describes the barriers for women in technology professions – particularly for those that have children – and how women can overcome to have both a career and a family.