New Qilin ransomware encryptor features stronger encryption, evasion

October 24, 2024 at 11:22AM The new Qilin.B ransomware, identified by Halcyon, features advanced encryption techniques and evasion strategies, targeting critical systems and processes to obstruct data recovery. It utilizes AES-256-CTR, ChaCha20, and RSA-4096 for robust encryption. The malware poses significant threats to networks, building on previous high-profile attacks. ### Meeting Takeaways: 1. **Introduction of … Read more

Bumblebee Malware Loader Resurfaces Following Law Enforcement Takedown

October 22, 2024 at 06:22AM The Bumblebee malware loader may be reemerging after a law enforcement operation in May 2024. This malicious campaign highlights the potential revival of this threat. The information is reported by SecurityWeek. **Meeting Takeaways:** 1. **Resurgence of Bumblebee Malware Loader**: There is a new malicious campaign indicating that the Bumblebee malware … Read more

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

October 22, 2024 at 06:18AM Two malware families, Bumblebee and Latrodectus, have resurfaced in new phishing campaigns following a law enforcement operation called Endgame. Both are malware loaders aimed at stealing personal data. The campaigns utilize malicious email attachments and links to deploy these threats, targeting sectors like finance, automotive, and business. ### Meeting Takeaways … Read more

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

October 15, 2024 at 11:54AM North Korean hackers are using a Linux variant of FASTCash malware to steal funds via compromised payment switches, facilitating unauthorized ATM withdrawals. The malware intercepts transaction messages to approve fraudulent transactions of 12,000 to 30,000 Lira. This highlights vulnerabilities in Linux server detection capabilities. **Meeting Takeaways: Financial Fraud / Linux … Read more

AI code helpers just can’t stop inventing package names

September 30, 2024 at 12:04AM Two recent studies highlight the issue of AI models generating fictitious software package names, raising concerns about the potential security risks. Researchers found that LLMs, including commercial and open-source models, exhibited significant rates of hallucinated package names, posing a threat to code quality and reliability. The studies emphasize the need … Read more

How to Plan and Prepare for Penetration Testing

September 27, 2024 at 07:30AM The advancing security technology is matched by adversaries implementing new techniques to enhance speed and impact while evading detection. Ransomware and malware remain prominent tools for cyber criminals, with hands-on intrusion techniques posing a threat. To manage risks, security practitioners seek penetration testing services, which involve detailed planning and preparation. … Read more

Cisco Patches High-Severity Vulnerabilities in IOS Software

September 26, 2024 at 09:19AM SecurityWeek Network offers cybersecurity news, webcasts, and virtual events. It covers various topics such as malware, cyberwarfare, data breaches, ransomware, and more. It also provides information on security operations, threat intelligence, incident response, and risk management. Additionally, it features sections on CISO strategy, industrial cybersecurity, funding, and M&A in cybersecurity. … Read more

Third Recent Ivanti Vulnerability Exploited in the Wild

September 25, 2024 at 07:18AM SecurityWeek Network provides cybersecurity news, webcasts, and virtual events. It covers a wide range of topics including malware, cyberwarfare, data breaches, ransomware, incident response, network security, risk management, and CISO strategy. It also offers insight into ICS/OT, industrial cybersecurity, cyber insurance, funding, and M&A. Based on the meeting notes, it … Read more

Microsoft Says Windows Update Zero-Day Being Exploited to Undo Security Fixes

September 10, 2024 at 04:28PM The SecurityWeek Network offers cybersecurity news, webcasts, and virtual events. Topics include malware, cyberwarfare, cybercrime, data breaches, fraud, ransomware, vulnerabilities, threat intelligence, incident response, security architecture, cloud security, identity and access, IoT security, network security, risk management, data protection, privacy, compliance, and CISO strategy. The network also covers industrial cybersecurity … Read more

Russian GRU Unit Tied to Assassinations Now Linked to Global Cyber Sabotage and Espionage

September 5, 2024 at 02:48PM SecurityWeek Network offers cybersecurity news, webcasts, and virtual events. Topics covered include malware, cyber warfare, data breaches, ransomware, and more. The network also provides information on security operations, incident response, risk management, and cybersecurity funding and M&A. The ICS Cybersecurity Conference and industrial cybersecurity are also featured. It seems like … Read more