Security week logo
Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive ransomware.
Read More
Dark reading logo
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
Read More
Cbs logo
One of the most notorious ransomware groups that has wreaked havoc across the world has gone dark for now.
Read More
Venturebeat logo
Earlier today, the FBI seized the Hive ransomware gang’s dark web website as part of a “coordinated law enforcement action” alongside the Secret Service and other European enforcement agencies.
Read More
The cyber wire logo
Taking down the Hive ransomware gang
January 26, 2023
CyberWire
The US Department of Justice says that a joint US and European operation has taken down the notorious Hive ransomware gang.
Read More
Sc media logo
Researchers on Thursday reported on multiple campaigns they have stopped in which threat actors used HR policy announcements and benefits updates to start off 2023 to lure victims and steal employees credentials.
Read More
Tech republic logo
The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense.
Read More
Axios logo
Criminal gangs are using a new method to guarantee a ransomware payout: They're ditching the part where they lock up a target firm's systems by encrypting them and are skipping straight to holding the company's precious data for ransom.
Read More
Sc media logo
A lot of the SaaS apps are from small, growing companies, which means they often have poor security. That’s why the Intruder researchers say security teams need to deploy password managers, enable two-factor authentication, and offer security training to the rank-and-file staff.
Read More
Dark reading logo
Artificial intelligence and machine learning (AI/ML) models have already shown some promise in increasing the sophistication of phishing lures, creating synthetic profiles, and creating rudimentary malware, but even more innovative applications of cyberattacks will likely come in the near future.
Read More
Tech republic logo
A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats.
Read More
Sc media logo
Researchers on Thursday showed just how fast today’s threat actors are moving to the cloud by reporting that Automated Libra, the South African threat group behind the freejacking campaign PurpleUrchin, created more than 130,000 user accounts on various platforms, including Heroku, Togglebox, and GitHub to conduct crytpomining operations.
Read More
Axios logo
The AI-enabled chatbot that's been wowing the tech community can also be manipulated to help cybercriminals perfect their attack strategies
Read More
Wired logo
Any multifactor authentication adds protection, but a physical token is the best bet when it really counts.
Read More
Sc media logo
The FBI, Food and Drug Administration, and Department of Agriculture have warned that U.S. food suppliers had hundreds of thousands of dollars in shipments stolen in business email compromise attacks, according to CNN.
Read More
Cnn logo
Cybercriminals have in recent months stolen hundreds of thousands of dollars’ worth of shipments from US food suppliers by placing fraudulent orders for milk products, the FBI and other federal agencies warned on Friday.
Read More
It world canada
A Lilac Wolverine business email compromise (BEC) gang is launching widespread campaigns requesting gift cards. To begin, the threat actor compromises a personal email account and copies its contact list. The attackers then created a new email account with the same email address as the compromised account, but with a different provider (usually Gmail, Hotmail, or Outlook).
Read More
Sc media logo
Cybercrime operation Lilac Wolverine has launched a massive gift card business email compromise attack, which lures targets into giving gift cards to individuals posing as seriously ill people or having lost relatives to illnesses, ZDNET reports.
Read More
The record logo
A cybercrime group based in Nigeria is targeting businesses in the United States and Western Europe with a plethora of scam emails as part of a larger campaign of business email compromise (BEC) attacks.
Read More
Crn logo
Despite economic headwinds, cybersecurity startups still did well in terms of raising funds in 2022. CRN breaks down what you should know about some of the security standouts.
Read More
Help net security logo
Infosec products of the month: November 2022
November 30, 2022
Help Net Security
The new Security Posture Management product from Abnormal gives security teams immediate visibility to each of the potential entry and exit points to the cloud email platform.
Read More
Zd net logo
A cruel business email compromise (BEC) gang is hacking people's email accounts and sending messages to their contacts claiming the account owner needs to send a gift to an unwell friend in an attempt to manipulate people into sending online gift cards.
Read More
Help net security logo
Abnormal Security has released Security Posture Management, its newest addition to the product portfolio as the company progresses toward delivering the cloud email security.
Read More
PR 11 14 22 PR Graphics SPM Launch 1
Abnormal Security announced today its newest addition to the product portfolio as the company progresses toward delivering the most comprehensive cloud email security in the market. The latest innovation protects customers from emerging email platform attacks that are increasing in volume and severity as attackers find new ways to target organizations.
Read More