Cybersecurity News
Conti Ransom Gang Starts Selling Access to Victims
The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti's malware who refuse to negotiate a ransom payment are added to Conti's victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.SolarWinds APT Targets Tech Resellers in Latest Supply-Chain Cyberattacks

Cybersecurity Month: Work from Home Security Awareness Training
As an Official Champion of National Cyber Security Awareness Month (NCSAM), the Council will be sharing educational resources on payment security best practices on the PCI Perspectives blog, and through our Twitter (@PCISSC) and LinkedIn pages. The Council will align these resources with the four weekly themes outlined by the National Cyber Security Alliance:
Ransomware attacks in UK have doubled in a year, says GCHQ boss

Jeremy Fleming says ransomware is proliferating as it is ‘largely uncontested’ and highly profitable
The head of the UK spy agency GCHQ has disclosed that the number of ransomware attacks on British institutions has doubled in the past year.
Jeremy Fleming, the director of GCHQ, said locking files and data on a user’s computer and demanding payment for their release had become increasingly popular among criminals because it was “largely uncontested” and highly profitable.
Continue reading...CISA Urges Sites to Patch Critical RCE in Discourse

SolarWinds hackers, Nobelium, once again strike global IT supply chains, Microsoft warns
The APT is probing potential new technology supply chain victims.FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks

REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say

Week in security with Tony Anscombe
How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Cisco SD-WAN Security Bug Allows Root Code Execution

Paving the way: Inspiring Women in Payments - A Q&A featuring Cari King
She was the first woman in her family to complete high school and a first-generation college graduate. But, as a single mom on public assistance, Cari King knew that she needed more than a job to improve her situation; she needed a career. However, she did not know any female role models with careers to show her the way. In fact, it wasn’t until she was in her thirties that she first met a woman with a career in technology. First, it was a female retail computer store owner who took a chance on her. Then, it was a female computer programmer who saw her potential and encouraged Cari to believe in herself. In this edition of our blog, Cari explains why it’s important to continue to expose girls to successful women in the tech industry, even if role models are difficult to find in their own community.
Threat Actors Abuse Discord to Push Malware

Ex-carrier employee sentenced for role in SIM-swapping scheme
He was paid a daily fee to route victim numbers to handsets controlled by other criminals.South African police arrest eight men suspected of targeting widows in romance scams
The gang concocted "sob stories" to lure their victims into parting with cash.What’s lurking in the shadows? How to manage the security risks of shadow IT
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
The post What’s lurking in the shadows? How to manage the security risks of shadow IT appeared first on WeLiveSecurity
What’s lurking in the shadows? How to manage the security risks of shadow IT
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
The post What’s lurking in the shadows? How to manage the security risks of shadow IT appeared first on WeLiveSecurity
U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn

Resource Guide: Defending Against Ransomware
Ransomware attacks have been front and center in the news recently due to high-profile breaches that have impacted businesses across the globe. These headline grabbing attacks have been part of a larger global increase in ransomware crime. With a dramatic increase in security challenges due to the disruptions caused in part by the COVID-19 pandemic, there has been a significant increase in ransomware attacks.
TA551 Shifts Tactics to Install Sliver Red-Teaming Tool
