GhostSec and Stormous launch joint ransomware attacks in over 15 countries

The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “Ransomware groups TheGhostSec and Stormous are jointly conducting double-extortion ransomware attacks on…

The same vendor behind the third-party breaches

Fidelity Investments Life Insurance Company (FILI) is notifying nearly 30,000 affected individuals of a third-party data breach that compromised their information. According to a notice filed with the state of…

VMware releases security patches for ESXi, Workstation and Fusion flaws

06 March 2024PressroomSoftware security/vulnerabilities VMware has released patches to address four security flaws impacting ESXi, Workstation, and Fusion, including two critical flaws that could lead to code execution. Tracked as…

Apple’s Zero-Day Exploits bypass kernel security

Apple has released emergency security updates to fix two critical iOS zero-day vulnerabilities that hackers are actively using to compromise iPhone users at the kernel level. Second Apple security bulletin…

Hackers exploit misconfigured YARN, Docker, Confluence, and Redis servers for cryptocurrency mining

06 March 2024PressroomServer Security/Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed…

The rise of social engineering fraud in business email compromise

Social engineering is present in 90% of phishing attacks Today. However, Business Email Compromise (BEC) attacks stand out in the cybercrime industry due to their emphasis Social engineering and the…

BlackCat Ransomware Group Disappears After $22 Million Payment

06 March 2024PressroomCybercrime/ransomware The threat actors behind the BlackCat ransomware shut down their website in the darknet and likely launched an exit scam after uploading a fake law enforcement seizure…

10 essential processes to reduce the top 11 cloud risks

It’s now an old cliché that anyone who doesn’t move to the cloud is left behind. As a result, cloud security has been on the list of “hot new trends”…

How to Find and Fix Risky Sharing on Google Drive

06 March 2024News about hackersData security/cloud security Every Google Workspace administrator knows how quickly Google Drive becomes a messy mess of loosely shared confidential information. This is no one’s fault;…

Southern company builds SBOM electrical substation

S4x24 – Miami – Last year, energy giant Southern Company decided to inventory all the hardware, software and firmware of equipment operating at one of its Mississippi substations in an…