Several of the largest Russian ransomware cybercriminal gangs have partnered up and are sharing hacking techniques, purloined data-breach information, malware code and technology infrastructure.
click here for more information.
Archives: News
How to balance employee IT security policies
Hysolate announced the release of its latest enterprise security study exploring 200 enterprise IT and security leaders’ views on enterprise priorities for ensuring secure remote access to corporate resources.
click here for more information
Fighting an emerging cybercrime trend
On July 16, Microsoft’s Digital Crimes Unit (DCU) again secured a court order to take down malicious infrastructure used by cybercriminals. As we continually explore new ways to combat emerging trends and techniques to better protect our customers, we filed this case to target the use of “homoglyph” – or imposter – domains that are increasingly being used in a variety of attacks. As a result, a judge in the Eastern District of Virginia issued a court order requiring domain registrars to disable service on malicious domains that have been used to impersonate Microsoft customers and commit fraud.
‘Barely able to keep up’: America’s cyberwarriors are spread thin by attacks
The cybersecurity industry is stretched thin. Ransomware attacks are now so prolific that some companies simply cannot help every newly hacked victim get back online.
click here for more information.
The Cybersecurity 202: The Kaseya attack is a revolution in sophistication for ransomware hackers
The Kaseya ransomware attack, which paralyzed hundreds of businesses over the Fourth of July weekend, marks a major strategic advancement for the criminal hacking gangs that have wreaked havoc on U.S. businesses.
click here for more information.
House Panel Approves DHS Bill with ‘Historic’ Funding for Cybersecurity
A bill to fund the Department of Homeland Security now heads to the full Appropriations Committee in the House after passing unopposed through the related subcommittee with $2.42 billion for the Cybersecurity and Infrastructure Security Agency.
click here for more information.
Facebook Researchers Say They Can Detect Deepfakes And Where They Came From
Facebook researchers say they’ve developed artificial intelligence that can identify so-called “deepfakes” and track their origin by using reverse engineering.
click here for more information.
South Africa lays down the law on cybercrime
Despite major implementation challenges, the new legislation signals the country’s commitment to global cyber security…The country’s well-developed financial infrastructure makes it an attractive target for cyber criminals who use the internet for extortion, fraud, child pornography, human trafficking and selling illicit goods.
click here for more information.
National cyber crime investigation sparked after Northampton college hit by hackers
Kingsthorpe College officials say it was the victim of a cyber attack, which has ‘significantly reduced’ its capacity to run its information management systems, meaning it cannot reopen ‘safely’ at the moment ‘due to the restriction of critical health and safety functions’.
click here for more information.
U.S. recovers $2.3 million in ransom paid to Colonial Pipeline hackers
Justice Department officials said the FBI was able to track and recover 63.7 bitcoins, currently valued at about $2.3 million. The operation marks a rare ransom recovery for the critical infrastructure company that fell victim to the devastating cyberattack, as the “ransomware-as-a-service” business model booms. It marks the first recovery by the department’s new Ransomware Task Force.
click here for more information.