A CISO’s Guide to Avoiding Jail After a Breach

July 5, 2024 at 08:35AM While serving on the Commission on Enhancing National Cybersecurity, Joe Sullivan, a former Uber CSO, faced legal challenges for mishandling a data breach. The government’s effort to enforce good corporate behavior has led to an increase in legal actions against security leaders. To avoid trouble, it’s recommended that security leaders … Read more

Ransomware Extortion Demands Soar to $5.2M per Attack

July 3, 2024 at 12:13PM In 2024, ransomware demands have soared, with an average extortion demand per attack surpassing $5.2 million in the first half of the year. The largest demand was $100 million following an attack on India’s RCC, followed by demands of $50 million and $25 million for other organizations. Despite a decrease … Read more

What Cybersecurity Defense Looks Like for School Districts

July 2, 2024 at 10:07AM Schools and libraries globally face a rise in cybersecurity threats, with 29% of U.S. K-12 schools having been attacked, according to the Center for Internet Security. Johnathan Kim, from Woodland Hills School District, discusses the challenges and vulnerabilities schools encounter, emphasizing the need for robust cybersecurity measures and staff education … Read more

U.S. indicts Russian GRU hacker, offers $10 million reward

June 27, 2024 at 03:33PM Russian national Amin Timovich Stigal was indicted by the U.S. for cyberattacks on Ukrainian government networks, using a U.S.-based company to distribute destructive pseudo-ransomware and engaging in data exfiltration and information leakages. The announcement also included details about his involvement in hacking activities against the U.S. and NATO. Stigal faces … Read more

Your Phone’s 5G Connection is Vulnerable to Bypass, DoS Attacks

June 27, 2024 at 01:13PM Wireless service providers prioritize uptime and lag time, sometimes compromising security. This can enable attackers to exploit vulnerabilities, resulting in data theft and other serious consequences. Based on the meeting notes, the key takeaway is that wireless service providers prioritize uptime and lag time, sometimes at the expense of security, … Read more

WhisperGate suspect indicted as US offers a $10M bounty for his capture

June 26, 2024 at 08:47PM A 22-year-old Russian, Amin Timovich Stigal, has been indicted by the US Department of Justice for allegedly targeting Ukrainian government computers in a cyber attack known as “WhisperGate”. Stigal faces a potential five-year prison sentence and a $10 million reward has been offered for information leading to his location. The … Read more

Car Dealerships in North America Revert to Pens and Paper After Cyberattacks on Software Provider

June 25, 2024 at 06:43AM Major disruptions have hit North American car dealerships following cyberattacks on CDK Global, impacting operations and causing delays for car buyers. Several dealership chains implemented alternative processes to continue operations. CDK serves more than 15,000 retail locations in North America and the outage is expected to last several days. Customers … Read more

4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree

June 25, 2024 at 12:03AM Four Vietnamese nationals linked to the FIN9 cybercrime group have been indicted in the U.S. for orchestrating computer intrusions causing over $71 million in losses to companies. They are accused of conducting phishing campaigns and using stolen information for criminal activities. This comes amid global efforts to combat cybercrime. From … Read more

Chinese Hackers Have Stepped Up Attacks on Taiwanese Organizations, Cybersecurity Firm Says

June 24, 2024 at 03:18PM A Chinese state-sponsored hacking group known as RedJuliett has intensified attacks on Taiwanese organizations, particularly in government, education, technology, and diplomacy sectors. They exploited a vulnerability in SoftEther VPN software to access servers. The group’s activities align with Chinese state-sponsored hacking patterns. Recorded Future expects continued targeting of Taiwanese agencies, … Read more

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

June 24, 2024 at 01:30AM Cyber espionage groups are using an Android remote administration tool, Rafel RAT, disguised as popular apps like Instagram and WhatsApp. This tool can perform various malicious activities like data theft and device manipulation. It has been used in cyber attacks targeting high-profile entities across multiple countries. It highlights the need … Read more