Behind the Scenes of Matveev’s Ransomware Empire: Tactics and Team

December 19, 2023 at 10:45AM Cybersecurity researchers disclosed details about the ransomware operation run by Russian national Mikhail Pavlovich Matveev, who allegedly led attacks worldwide. Matveev and his team demonstrate a relentless pursuit of ransom payments, engaging in dishonest practices and showing a disregard for ethical values. They utilize various tactics and tools for their … Read more

Unsung GitHub Features Anchor Novel Hacker C2 Infrastructure

December 19, 2023 at 07:35AM Cybersecurity research uncovers an individual, “Yeremy,” misusing GitHub to host stage-two malware by exploiting “gists” and commits, evading detection. Hackers are increasingly leveraging public service platforms, like GitHub, for their illicit activities due to their access, lack of scrutiny, and minimal effort required. This tactic offers a stealth advantage over … Read more

Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits

December 18, 2023 at 11:39AM Security researcher Ben Barnea revealed two security flaws in Microsoft Windows that were patched in 2023. These flaws, CVE-2023-35384 and CVE-2023-36710, could be exploited by threat actors to achieve remote code execution on Outlook without user interaction. Mitigation recommendations include microsegmentation and addressing NTLM vulnerabilities. For further updates, follow the … Read more

Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024

December 18, 2023 at 10:05AM The SolarWinds attack in December 2020 compromised 18,000 organizations and revealed vulnerabilities in supply chain security. Recent developments highlight SolarWinds’ breach detection timeline and resulted in legal action. Regulators are pursuing improved security practices, and governments and organizations are working together to strengthen cybersecurity frameworks, promote information sharing, and prioritize … Read more

Rhadamanthys Stealer malware evolves with more powerful features

December 17, 2023 at 04:52PM The Rhadamanthys information-stealing malware has recently released two major versions with added improvements, such as new stealing capabilities, enhanced evasion, and a new plugin system for customization. These updates indicate a shift towards a more modular and customizable framework, making it a more formidable tool for cybercriminals. From the meeting … Read more

What to do when receiving unprompted MFA OTP codes

December 17, 2023 at 04:44PM Summary: Receiving an unprompted one-time passcode (OTP) in an email or text suggests stolen credentials, highlighting the theft of legitimate corporate network access. Cyberattacks exploit these credentials for data theft, espionage, ransomware, and financial fraud. Multi-factor authentication (MFA) enhances security, reducing successful breaches but caution is advised with SMS and … Read more

Cybersecurity Startup, Xeol, Raises $3.2M in Seed Round

December 15, 2023 at 03:03PM Xeol, a New York City-based cybersecurity company, raised $3.2 million in Seed funding led by Shield Capital. With a focus on securing software supply chains, Xeol emphasizes foundational standards like Software Bill of Materials (SBOM) and Supply-chain Levels for Software Artifacts (SLSA). The company has already signed its first Fortune … Read more

Pro-Hamas Cyberattackers Aim ‘Pierogi’ Malware at Multiple Mideast Targets

December 15, 2023 at 01:58PM The Gaza Cybergang, a pro-Hamas group, is using a new variant of the Pierogi++ backdoor malware to launch attacks on Palestinian and Israeli targets. The backdoor, based on C++ programming, has been distributed through phishing attacks and social media engagements, with consistent targeting of Palestinian entities reported by Sentinel Labs … Read more

Complex ‘NKAbuse’ Malware Uses Blockchain to Hide on Linux, IoT Machines

December 15, 2023 at 01:22PM A versatile malware named NKAbuse, deployed as both a flooder and backdoor, has been discovered targeting Linux systems in Colombia, Mexico, and Vietnam. Written in Go, it exploits the NKN blockchain-oriented peer-to-peer networking protocol. Utilizing various methods, including exploiting vulnerabilities, it has the capacity to launch DDoS attacks and compromise … Read more

Communicating with Impact: Tips for Discussing Cybersecurity Metrics with Boards

December 14, 2023 at 02:06PM CISOs are tasked with evaluating and reporting on cybersecurity’s impact on the business. They need to identify relevant metrics that provide insight into risk management, threat landscape, and control effectiveness. Presenting cybersecurity metrics in the context of business risk and aligning them with emerging risks and regulatory changes is crucial … Read more