US Sanctions Chinese Cybersecurity Firm for Ransomware Attack

US Sanctions Chinese Cybersecurity Firm for Ransomware Attack

The U.S. has sanctioned Sichuan Silence, a Chinese cybersecurity firm involved in ransomware attacks targeting critical infrastructure in 2020. One of its employees, Guan Tianfeng, has also been charged individually. Guan, a security researcher, discovered a zero-day vulnerability in a firewall product developed by U.K.-based security firm Sophos. He exploited the vulnerability, designated CVE 2020-12271, using a SQL injection attack that retrieved and remotely executed a script from a malicious server. Guan and his co-conspirators…

Read More

Cybersecurity News Round-Up 2024: Top 10 Biggest Stories

Cybersecurity News Round-Up 2024: Top 10 Biggest Stories

This year has not been quiet for the cybersecurity field. We have seen record-breaking data breaches, huge ransomware payouts, and illuminating studies about the impact of the increasingly complex and ever-evolving threat landscape. As we approach the new year, TechRepublic revisits the biggest cybersecurity stories of 2024. 1.  Midnight Blizzard’s attack on Microsoft In January, Microsoft disclosed that it had been a victim of a nation-state-backed attack beginning in November 2023. The Russian threat actor…

Read More

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks and several major U.K. supermarkets experienced disruption due to a ransomware attack on the prominent supply chain software provider Blue Yonder. The company disclosed the incident on Thursday, Nov. 21, and it was still working to restore services the following Monday. The disruption to the Blue Yonder platform prevented Starbucks from paying its baristas and managing their schedules, according to the Wall Street Journal. As a result, cafe managers had to manually calculate their…

Read More

The evolving rate of patch management and eISSU for financials

The evolving rate of patch management and eISSU for financials

The ransomware threat has never been greater than it is today. Financial institutions process more digital transactions for more customers today than at any point in human history. The wealth that can be exploited through disruption in any large financial market is significant. Ransomware and malware have been areas of key concern by regulators in the past 24 months and updates to the Federal Financial Institutions Examination Council (FFIEC) and PCI DSS 4.0 now both…

Read More

The evolving rate of patch management and eISSU for financials

The evolving rate of patch management and eISSU for financials

The ransomware threat has never been greater than it is today. Financial institutions process more digital transactions for more customers today than at any point in human history. The wealth that can be exploited through disruption in any large financial market is significant. Ransomware and malware have been areas of key concern by regulators in the past 24 months and updates to the Federal Financial Institutions Examination Council (FFIEC) and PCI DSS 4.0 now both…

Read More

Change Healthcare Cyberattack Exposed Data From Over 100 Million People

Change Healthcare Cyberattack Exposed Data From Over 100 Million People

Threat actors accessed the data of 100 million people in the February breach of Change Healthcare, the U.S. Office for Civil Rights showed on Oct. 22. The hack, information about which was revealed in June, could affect up to one-third of Americans. It has proven to be one of the most significant cyberattacks of the year and shows how ransomed data can lead to physical harms such as belated delivery of essential medication. What was…

Read More

Countering ransomware: Ransomware gang disruptions do work

Countering ransomware: Ransomware gang disruptions do work

Countering ransomware remains one of the top priorities for nations and their law enforcement and intelligence agencies. The persistence of ransomware, which can largely be attributed to its high profits combined with the safe harbor given to ransomware actors in Russia, has evolved into a cybercrime battle with no perfect solution. In many cases, it is not possible to arrest, prosecute or even indict the perpetrators.  In the face of these challenges, governments are increasingly…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

The number of attempted ransomware attacks on Microsoft customers globally have grown dramatically in the last year, according to Microsoft’s Digital Defense report, released on Oct. 15. However, advancements in automatic attack disruption technologies have led to fewer of these attacks reaching the encryption stage. Microsoft reported 600 million cybercriminal and nation-state attacks occurring daily. While ransomware attempts increased by 2.75 times, successful attacks involving data encryption and ransom demands dropped by three-fold. The inverse…

Read More

Number of Active Ransomware Groups Highest on Record

Number of Active Ransomware Groups Highest on Record

This year has seen the highest number of active ransomware groups on record, with 58 attacking global businesses in the second quarter. Threat intelligence platform provider Cyberint has reported only a slight dip in the third quarter, with 57 active groups. Furthermore, in Q3, the top 10 ransomware groups were responsible for only 58.3% of all detected attacks. This reflects both the increase in the number of active groups in general and a decline in…

Read More
1 2 3 42