Tag: attack

  • The Register: UK floats ransomware payout ban for public sector

    Source URL: https://www.theregister.com/2025/01/14/uk_ransomware_payout_ban/ Source: The Register Title: UK floats ransomware payout ban for public sector Feedly Summary: Stronger proposals may also see private sector applying for a payment ‘license’ A total ban on ransomware payments across the public sector might actually happen after the UK government opened a consultation on how to combat the trend…

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • Slashdot: Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup

    Source URL: https://it.slashdot.org/story/25/01/14/0920245/snyk-researcher-caught-deploying-malicious-code-targeting-ai-startup Source: Slashdot Title: Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a dependency confusion attack targeting Cursor, an AI coding startup, via the publication of malicious NPM packages. This incident raises significant concerns regarding supply chain security and illustrates potential…

  • The Register: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used

    Source URL: https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/ Source: The Register Title: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used Feedly Summary: Ransomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg Miscreants running a “mass exploitation campaign" against Fortinet firewalls, which peaked in December, may be using an unpatched zero-day vulnerability to compromise the equipment, according…

  • Rekt: Moby Trade – Rekt

    Source URL: https://www.rekt.news/mobytrade-rekt Source: Rekt Title: Moby Trade – Rekt Feedly Summary: When your private keys become the white whale, who’s really hunting whom? Moby Trade loses roughly $1 million to a compromised key, while white hats rescue $1.47M from the depths. Some lessons of the sea only need to be learned once. AI Summary…

  • The Register: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug

    Source URL: https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/ Source: The Register Title: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug Feedly Summary: This is what happens when you publish PoCs immediately “Several cloud deployments" are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.… AI Summary and Description: Yes Summary: The text discusses a…

  • Alerts: CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/13/cisa-and-us-and-international-partners-publish-guidance-priority-considerations-product-selection-ot Source: Alerts Title: CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators Feedly Summary: Today, CISA—along with U.S. and international partners—released joint guidance Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products. As part of CISA’s Secure…

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • CSA: How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

    Source URL: https://www.illumio.com/blog/how-illumio-simplified-ebays-large-scale-microsegmentation-project Source: CSA Title: How Illumio Simplified eBay’s Large-Scale Microsegmentation Project Feedly Summary: AI Summary and Description: Yes Summary: The text outlines eBay’s cybersecurity enhancements through Illumio’s Zero Trust Segmentation (ZTS) platform, focusing on the implementation of microsegmentation to fortify its expansive network against breaches and ransomware. Key benefits include enhanced visibility, simplified…