Cybersecurity News


MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption

MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption A politically motivated group is paralyzing Israeli entities with no financial goal -- and no intention of handing over decryption keys.
16 November 2021

Belarus government accused of 'partial responsibility' for Ghostwriter campaigns

Mandiant says the government is likely to blame for anti-NATO campaigns, and more.
16 November 2021

Strategic web compromises in the Middle East with a pinch of Candiru

ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East

The post Strategic web compromises in the Middle East with a pinch of Candiru appeared first on WeLiveSecurity

16 November 2021

Emotet Resurfaces on the Back of TrickBot After Nearly a Year

Emotet Resurfaces on the Back of TrickBot After Nearly a Year Researchers observed what looks like the Emotet botnet – the "world’s most dangerous malware" – reborn and distributed by the trojan it used to deliver.
16 November 2021

MosesStaff attacks organizations with encryption malware - no payment demand made

Israeli firms are being targeted for purely political and destructive purposes.
16 November 2021

New banking Trojan SharkBot makes waves across Europe, US

The malware specializes in infiltrating Android handsets.
16 November 2021

The Best Ransomware Response, According to the Data 

The Best Ransomware Response, According to the Data  An analysis of ransomware attack negotiation-data offers best practices.
15 November 2021

High-Severity Intel Processor Bug Exposes Encryption Keys

High-Severity Intel Processor Bug Exposes Encryption Keys CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files.
15 November 2021

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted. According to research from Trend Micro, the Chinese giant’s cloud (also known as Aliyun) has a preinstalled security agent. While […]
15 November 2021

FBI systems compromised to send out fake attack alerts

Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks

The post FBI systems compromised to send out fake attack alerts appeared first on WeLiveSecurity

15 November 2021

FBI Says Its System Was Exploited to Email Fake Cyberattack Alert

FBI Says Its System Was Exploited to Email Fake Cyberattack Alert The alert was mumbo jumbo, but it was indeed sent from the bureau's email system, from the agency’s own internet address.
15 November 2021

Hoax Email Blast Abused Poor Coding in FBI Website

The Federal Bureau of Investigation (FBI) confirmed today that its fbi.gov domain name and Internet address were used to blast out thousands of fake emails about a cybercrime investigation. According to an interview with the person who claimed responsibility for the hoax, the spam messages were sent by abusing insecure code in an FBI online portal designed to share information with state and local law enforcement authorities.
13 November 2021

Threat from Organized Cybercrime Syndicates Is Rising

Threat from Organized Cybercrime Syndicates Is Rising Europol reports that criminal groups are undermining the EU’s economy and its society, offering everything from murder-for-hire to kidnapping, torture and mutilation.
12 November 2021

Costco Confirms: A Data Skimmer’s Been Ripping Off Customers

Costco Confirms: A Data Skimmer’s Been Ripping Off Customers Big-box behemoth retailer Costco is offering victims 12 months of credit monitoring, a $1 million insurance reimbursement policy and ID theft recovery services.
12 November 2021

Top 10 Cybersecurity Best Practices to Combat Ransomware

Top 10 Cybersecurity Best Practices to Combat Ransomware Immutable storage and more: Sonya Duffin, data protection expert at Veritas Technologies, offers the Top 10 steps for building a multi-layer resilience profile.
12 November 2021

Windows 10 Privilege-Escalation Zero-Day Gets an Unofficial Fix

Windows 10 Privilege-Escalation Zero-Day Gets an Unofficial Fix Researchers warn that CVE-2021-34484 can be exploited with a patch bypass for a bug originally addressed in August by Microsoft.
12 November 2021

Mac Zero Day Targets Apple Devices in Hong Kong

Mac Zero Day Targets Apple Devices in Hong Kong Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.
12 November 2021

Week in security with Tony Anscombe

Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

12 November 2021

Millions of Routers, IoT Devices at Risk from New Open-Source Malware

Millions of Routers, IoT Devices at Risk from New Open-Source Malware BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.
12 November 2021

Invest in These 3 Key Security Technologies to Fight Ransomware

Invest in These 3 Key Security Technologies to Fight Ransomware Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labs , discusses secure email, network segmentation and sandboxing for defense.
11 November 2021