ChaChi, a GoLang Trojan used in ransomware attacks on US schools
A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence…
UNC2465 cybercrime group launched a supply chain attack on CCTV vendor
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as…
REvil ransomware gang hit US nuclear weapons contractor Sol Oriens
The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was…
G7 calls on Russia to dismantle operations of ransomware gangs within its borders
The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware gangs operating within their countries. G7 member states have called…
Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients
By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and management (RMM) platform to centrally manage their clients’ networks is a foregone…
Understanding The Surge in Cyber Extortion
By Jamie Wilson, Founder and Chairman, Cryptoloc Ransomware is on the rise, and it’s not slowing down. Cryptoloc founder and chairman Jamie Wilson explains the perfect storm of conditions that…
French intel found flaws in Bluetooth Core and Mesh specs
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at the french intelligence agency ANSSI discovered multiple flaws in the Bluetooth Core and Mesh…
Contactless Passwordless Auto Login
with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its…
Identity crisis? It’s time to take the holistic approach.
In planning for a secure future hybrid working reality, many IT leaders have reconsidered how they manage the identities on their network. Their workforce now uses new systems and devices,…
How to Prevent Ransomware Attacks On Industrial Networks
Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By Michael Yehoshua, VP of Global Marketing, SCADAfence Since the outbreaks of Wannacry &…
Darkside gang lost control of their servers and funds
The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds the gang obtained from the victims. Darkside ransomware operators say…
A cyberattack shutdown US Colonial Pipeline
A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in Pelham, Alabama. The Colonial Pipeline facility in Pelham, Alabama was…