FBI, DoJ Shut Down BreachForums, Launch Investigation

May 15, 2024 at 04:59PM The website no longer deals in illegal items and instead encourages individuals with relevant information to reach out to the authorities to assist with the investigation. It seems that the website has been updated to prompt anyone with relevant information to contact the authorities instead of engaging in online contraband … Read more

Zscaler takes “test environment” offline after rumors of a breach

May 8, 2024 at 08:37PM Zscaler discovered a breached “test” environment, after rumors surfaced of a threat actor selling access to the company’s systems. Zscaler confirmed the test environment was not linked to their infrastructure and took it offline for analysis, assuring no impact on their customer or production environments. The incident was associated with … Read more

Zscaler says it was not hacked after rumors circulate online

May 8, 2024 at 07:37PM Zscaler denies the rumors of a breach after a threat actor claimed to be selling access to a cybersecurity company. The company stated no evidence of a breach in its ongoing investigation and prioritizes the security of its customer and production environments. Additionally, a Zscaler employee urged caution in spreading … Read more

Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

May 2, 2024 at 08:45AM Ukrainian national Yaroslav Vasinskyi, also known as Rabotnik, has been sentenced to over 13 years in prison and ordered to pay $16 million in restitution for his involvement in over 2,500 ransomware attacks, part of the REvil group. The attacks saw demands exceeding $700 million in cryptocurrency. Vasinskyi was extradited … Read more

Lost Crypto Wallet? New Firm Promises Ethical, Transparent and Inexpensive Recovery

March 21, 2024 at 04:24PM Praefortis, a new company founded in 2024, aims to ethically recover lost or forgotten crypto wallet passwords, offering a lower fee structure than other alternatives. It was formed by experts Jim Carden and Wesley Brandi, who combine digital forensics and coding expertise in their password recovery method. The company emphasizes … Read more

How to Identify a Cyber Adversary: What to Look For

March 14, 2024 at 10:07AM Attributing a cyber incident to a specific threat actor involves multiple factors. Based on the meeting notes, it is clear that attributing a cyber incident to a specific threat actor is a complex task with many factors involved. Full Article

iShutdown scripts can help detect iOS spyware on your iPhone

January 17, 2024 at 01:07PM Security researchers discovered a method to detect spyware infections like Pegasus, Reign, and Predator on compromised Apple mobile devices by analyzing the Shutdown.log file. Kaspersky released Python scripts to automate this process and recommend regular device restarts to capture signs of infection. The method proved reliable in identifying spyware-related behaviors … Read more

C3 Complete Acquires Information Security Business Unit of Compliance Solutions Inc.

January 4, 2024 at 05:51PM C3 Complete acquires Compliance Solutions Inc.’s Cyber Security business unit, enhancing its service portfolio with Security Risk Assessments, Digital Forensics, and more. Jonathan Cox leads the combined teams as VP of Information Security. Both companies sponsor each other’s upcoming events. C3 Complete is a technology consultancy known for its in-house … Read more

Cyber security isn’t simple, but it could be

December 13, 2023 at 04:05AM Cybersecurity complexity has led to a proliferation of security tools and a shortage of skilled personnel, posing a significant challenge. Managed Security Service Providers (MSSPs) are gaining traction as a cost-effective solution. SecurityHQ, founded in 2003, offers integrated security services, including advanced threat detection, incident response, and AI-powered analytics. MSSPs … Read more

Think tank report labels NSO, Lazarus, as ‘cyber mercenaries’

December 13, 2023 at 01:07AM A Delhi-based think tank’s report argues that cybercrime groups and spyware vendors like Lazarus Group and NSO should be categorized as cyber mercenaries and face an international response. The usage of information technology in operations justifies this term. Concerns about the growth of this market and the need for legislation … Read more