The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “Ransomware groups TheGhostSec and Stormous are jointly conducting double-extortion ransomware attacks on…
Category: Cyber Security
The same vendor behind the third-party breaches
Fidelity Investments Life Insurance Company (FILI) is notifying nearly 30,000 affected individuals of a third-party data breach that compromised their information. According to a notice filed with the state of…
VMware releases security patches for ESXi, Workstation and Fusion flaws
06 March 2024PressroomSoftware security/vulnerabilities VMware has released patches to address four security flaws impacting ESXi, Workstation, and Fusion, including two critical flaws that could lead to code execution. Tracked as…
Apple’s Zero-Day Exploits bypass kernel security
Apple has released emergency security updates to fix two critical iOS zero-day vulnerabilities that hackers are actively using to compromise iPhone users at the kernel level. Second Apple security bulletin…
Hackers exploit misconfigured YARN, Docker, Confluence, and Redis servers for cryptocurrency mining
06 March 2024PressroomServer Security/Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed…
The rise of social engineering fraud in business email compromise
Social engineering is present in 90% of phishing attacks Today. However, Business Email Compromise (BEC) attacks stand out in the cybercrime industry due to their emphasis Social engineering and the…
BlackCat Ransomware Group Disappears After $22 Million Payment
06 March 2024PressroomCybercrime/ransomware The threat actors behind the BlackCat ransomware shut down their website in the darknet and likely launched an exit scam after uploading a fake law enforcement seizure…
10 essential processes to reduce the top 11 cloud risks
It’s now an old cliché that anyone who doesn’t move to the cloud is left behind. As a result, cloud security has been on the list of “hot new trends”…
How to Find and Fix Risky Sharing on Google Drive
06 March 2024News about hackersData security/cloud security Every Google Workspace administrator knows how quickly Google Drive becomes a messy mess of loosely shared confidential information. This is no one’s fault;…
Southern company builds SBOM electrical substation
S4x24 – Miami – Last year, energy giant Southern Company decided to inventory all the hardware, software and firmware of equipment operating at one of its Mississippi substations in an…