Cyber Threats Facing Financial Institutions Amid COVID-19

Cyber Threats Facing Financial Institutions Amid COVID-19

By Pablo Castillo, Cyber Threat Research Analyst, Constella Intelligence COVID-19 has accelerated security research into the cybersecurity implications of our society where large swaths of the population are fully remote. With constrained budgets, many organizations have made the difficult decision to deprioritize cybersecurity and instead allocate resources to other business functions that directly impact the bottom line. However, financial institutions are increasingly the target of cyber attacks. From February to the end of April 2020,…

Read More

US Court system demands massive changes to court documents after SolarWinds hack

US Court system demands massive changes to court documents after SolarWinds hack

Multiple senators have demanded a hearing on what court officials know about the hackers’ access to sensitive filings. The effects could make accessing documents harder for lawyers. Image: iStock/Bill Chizek The House Homeland Security Committee held its first hearings this week on the devastating SolarWinds attack that gave Russian hackers months-long access to critical US government departments. But Senators are now demanding more information about the attacker’s infiltration of the US court system, which has…

Read More

Cyber Resiliency Will Become the New Normal In 2021 Combating the Rise of Ransomware

Cyber Resiliency Will Become the New Normal In 2021 Combating the Rise of Ransomware

By Drew Daniels, CIO and CISO, Druva This past year, cyber resiliency proved to be a vital asset to ensure business continuity, and it’s one that will continue to take precedence in 2021. Over the last 12 months, we have witnessed cloud migrations continue to happen, now on an accelerated timeline on a global scale as organizations adapt to a digital workplace. Unfortunately, the numbers seem to indicate that only a handful of businesses were…

Read More

Threat Roundup for February 5 to February 12 – Cisco Blogs

Threat Roundup for February 5 to February 12 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 5 and February 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

How micro-drilling can enhance your cybersecurity training

How micro-drilling can enhance your cybersecurity training

Agile thinking is important in dealing with cyberattacks. Read one psychologist’s tips for cybersecurity professionals on how to adapt and stop the attackers. Image: Nature, Getty Images/iStockphoto With a constant barrage of cyberattacks plaguing cybersecurity staffs, one expert has a new way to train teams in cognitive agility, which we discussed in a previous article, Cognitive agility can help solve some “wicked” cybersecurity challenges. Since cognitive agility is a learned behavior and a somewhat unusual…

Read More

CD Projekt Red game maker discloses ransomware attack

CD Projekt Red game maker discloses ransomware attack

The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher series, has suffered a ransomware attack. The company confirmed the security breach with a series of messages on its social media channels (Facebook and Twitter). Important Update pic.twitter.com/PCEuhAJosR — CD PROJEKT RED (@CDPROJEKTRED) February 9, 2021 The attack took place…

Read More

How Developers Can Get Started with Python and Docker – Docker Blog

How Developers Can Get Started with Python and Docker – Docker Blog

Python started in 1991 with humble beginnings focusing on helping “automate the boring stuff.” But over the past few years, we’ve seen Python grow in popularity and become extremely useful not only for scripting but for building modern web applications, machine learning and data science.  The TIOBE Index for February has Python ranked at number 3 on the list. Python has also been in the top 8 rank programming languages for the past 7 years….

Read More

Three Charged Over Fraudulent Vaccine Website

Three Charged Over Fraudulent Vaccine Website

Three men in Baltimore County have been accused of impersonating Massachusetts pharmaceutical and biotechnology company Moderna to sell fake COVID-19 vaccines.  Twenty-two-year-old Owings Mills resident Kelly Lamont Williams, together with cousins and Windsor Mill residents 22-year-old Olakitan Oluwalade and 25-year-old Odunayo Baba Oluwalade, also known as Olaki and Baba respectively, were arrested on February 11.  A criminal complaint unsealed yesterday accuses the trio of copying the source code of the genuine Moderna website (modernatx.com) and using it to create…

Read More

US Jails Money Mule Kingpin

US Jails Money Mule Kingpin

A Ukrainian man will spend the next seven years in prison in the United States for helping Eastern European computer hackers to obtain and launder millions of dollars in stolen funds.  Odessa resident Aleksandr Musienko partnered with the hackers to steal over $3m from online bank accounts and businesses in the United States, then launder the stolen money overseas.  Information hacked and stolen by the 38-year-old’s partners in the scheme allowed them to impersonate US victims…

Read More

Diners Devour Made-to-Order Fraud

Diners Devour Made-to-Order Fraud

Restaurants and food delivery services are being ripped off by a new made-to-order fraud scheme taking place on the messaging app Telegram. Research and analysis from Sift’s Digital Trust and Safety Architects found that bad actors are advertising heavily discounted food and beverage delivery services on the app’s forums. After receiving an order, the cyber-criminals pay with stolen credentials obtained from data breaches and cyber-attacks or leverage a hacked account with stored value to pay for…

Read More
1 58 59 60 61 62 268