Showing only posts by Jessica Lyons. Show all posts.

The intruder is in the house: Storm-0501 attacked Azure, stole data, demanded payment via Teams

Source

Don't let it happen to you Storm-0501, a financially motivated cybercrime crew, recently broke into a large enterprise's on-premises and cloud environments, ultimately exfiltrating and destroying data within the org's Azure environment. The criminals then contacted the victim via a Microsoft Teams account that they'd also compromised in the …

ZipLine attack uses 'Contact Us' forms, White House butler pic to invade sensitive industries

Source

'Many dozens' targeted in ongoing campaign, CheckPoint researcher tells The Reg Cybercriminals are targeting critical US manufacturers and supply-chain companies, looking to steal sensitive IP and other data while deploying ransomware. Their attack involves a novel twist on phishing — and a photo of White House butlers.... [...]

FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure

Source

Snarfing up config files for 'thousands' of devices...just for giggles, we're sure The FBI and security researchers today warned that Russian government spies exploited a seven-year-old bug in end-of-life Cisco networking devices to snoop around in American critical infrastructure networks and collect information on industrial systems.... [...]

Ransomware crews don't care about your endpoint security – they've already killed it

Source

Some custom malware, some legit software tools At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on the market, escalate privileges, and ultimately steal and encrypt data before extorting victims into paying a …

« newer articles | page 3 | older articles »