Tech Target

Cryptocurrency exchange BTC-Alpha confirms ransomware attack

Though the company did not reveal which competitor it believes is behind the attack, further information on the incident was provided on the official Telegram channel of the exchange.

Cybercriminals discuss new business model for zero-day exploits

The potential new service is a product of the highly profitable zero-day market, where researchers have seen multimillion-dollar price tags for vulnerabilities and exploits.

New side channel attack resurrects DNS poisoning threat

The research on the vulnerability, designated CVE-2021-20322, was presented Wednesday by researchers at the ACM Conference on Computer and Communications Security in South Korea.

Why cloud bugs don't get CVEs, and why it's an issue

Intended to provide admins with the necessary information for prioritizing and deploying patches, the CVE system was devised at a time when nearly all enterprise software was running on-premises.

Avast releases decryptors for multiple ransomware strains

Victims of three separate ransomware families can now recover data using tools developed by the antivirus vendor with help from a malware analyst and an alleged Babuk developer.

Staging activity observed on Exchange servers

Symantec said it "observed" attempts by threat actors to install "legitimate remote control software" and tools on the targeted networks of several U.S. sectors, including energy and healthcare.

US Real Estate Firm Marcus & Millichap Suffers Potential Attack by BlackMatter Ransomware

US real estate investment firm Marcus & Millichap suffered a recent cyberattack that may have been the work of the BlackMatter ransomware gang, according to a malware sample found on Hatching Triage.
September 16, 2021

Chinese APT Campaign Stole Data from Victim Organization Using Off-the-shelf Hacking and System Management Tools

The threat actors were able to gain their initial access to the victim by exploiting a vulnerability in a web access server. They further used privilege escalation exploits to steal credentials.

3 Ransomware Detection Techniques To Catch An Attack

Today, companies can't avoid ransomware threats. Eventually, attackers will get into an enterprise system. The goal then becomes to detect ransomware before it encrypts and exfiltrates business data.

College students targeted by money mule phishing techniques

University students in the U.S. with little or no security training are being targeted by Nigerian scammers to move fraudulent funds with the lure of quick bucks and flexible hours.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags