π RansomHub Overtakes LockBit as Most Prolific Ransomware Group π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
RansomHub Overtakes LockBit as Most Prolific Ransomware Group
Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024
π Two-thirds of Attributable Malware Linked to Nation States π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Netskope claims 66 of malware attacks last year were backed by nation states.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Two-thirds of Attributable Malware Linked to Nation States
Netskope claims 66% of malware attacks last year were backed by nation states
π΅οΈββοΈ Is a CPO Still a CPO? The Evolving Role of Privacy Leadership π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Is a CPO Still a CPO? Privacy Leadership's Evolving Role
Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?
β€1π1
π¦Ώ NIS 2 Compliance Deadline Arrives: What You Need to Know π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
NIS 2 Compliance Deadline Arrives: What You Need to Know
The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now.
π’ Fortify your future with HPE ProLiant Servers powered by Intel π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Enhance your security and manage your servers more effectively.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Fortify your future with HPE ProLiant Servers powered by Intel
Enhance your security and manage your servers more effectively
π1
π΅οΈββοΈ 4 Ways to Address Zero-Days in AI/ML Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
As the unique challenges of AI zerodays emerge, the approach to managing the accompanying risks needs to follow traditional security best practices but be adapted for AI.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
4 Ways to Address Zero-Days in AI/ML Security
As the unique challenges of AI zero-days emerge, the approach to managing the accompanying risks needs to follow traditional security best practices but be adapted for AI.
π΅οΈββοΈ Anonymous Sudan Unmasked as Leaders Face Life in Prison π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
US officials disrupted the group's DDoS operation and arrested two individuals behind it, who turned out to be far less intimidating than they were made out to be in the media.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Anonymous Sudan Unmasked as Leader Faces Life in Prison
US officials disrupted the cyber threat group's DDoS operation and arrested two individuals behind it, who turned out to be far less intimidating than they were made out to be in the media.
π¦Ώ Number of Active Ransomware Groups Highest on Record, Cyberintβs Report Finds π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
This indicates that the most prominent ransomware groups are succumbing to law enforcement takedowns, according to researchers from Cyberint.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Number of Active Ransomware Groups Highest on Record, Cyberintβs Report Finds
In the third quarter of 2024, the 10 most prominent ransomware groups were responsible for only 58.3% of attacks, according to Cyberint.
βοΈ Sudanese Brothers Arrested in βAnonSudanβ Takedown βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan a.k.a. AnonSudan, a cybercrime business known for launching powerful distributed denialofservice DDoS attacks against a range of targets, including dozens of hospitals, news websites and cloud providers. One of the brothers is facing life in prison for allegedly seeking to kill people with his attacks.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Sudanese Brothers Arrested in βAnonSudanβ Takedown
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a. AnonSudan), a cybercrime business known for launching powerful distributed denial-of-service (DDoS) attacks against a rangeβ¦
π§ The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Understaffing in cybersecurity the skills gap is driving up the cost of data breaches in recent years, according to a decade of reports by IBM. The 2024 IBM Data Breach Report found that more than half of breached organizations experienced severe security staffing shortages, a 26.2 increase from the previous year. They found The post The cybersecurity skills gap contributed to a 1.76 million increase in average breach costs appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs
Understaffing in cybersecurity β the "skills gap" β is driving up the cost of data breaches in recent years, according to a decade of reports by IBM.
ποΈ Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper aka SnipBot or RomCom 5.0, said Cisco Talos, which is monitoring the activity cluster under the moniker UAT5647. "This.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have gleaned additional insights into a nascent ransomwareasaservice RaaS called Cicada3301 after successfully gaining access to the group's affiliate panel on the dark web. Singaporeheadquartered GroupIB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime forum via the Tox messaging service after the latter put out an.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ 5 Ways to Reduce SaaS Security Risks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
As technology adoption has shifted to be employeeled, just in time, and from any location or device, IT and security teams have found themselves contending with an eversprawling SaaS attack surface, much of which is often unknown or unmanaged. This greatly increases the risk of identitybased threats, and according to a recent report from CrowdStrike, 80 of breaches today use compromised.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An advanced persistent threat APT actor with suspected ties to India has sprung forth with a flurry of attacks against highprofile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked as SideWinder, which is also known as APTC17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger, and TAPT04. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Cicada3301 Ransomware Targets Critical Sectors in US and UK π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cicada3301 ransomware has targeted critical sectors in USUK, leaking data from 30 firms in three months.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cicada3301 Ransomware Targets Critical Sectors in US and UK
Cicada3301 ransomware has targeted critical sectors in US/UK, leaking data from 30 firms in three months
π US Charges Anonymous Sudan Members in DDoS Cybercrime Case π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
US authorities have charged two Sudanese linked to DDoS cybercrime group, Anonymous Sudan, which caused 10m in damages.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
US Charges Anonymous Sudan Members in DDoS Cybercrime Case
US authorities have charged two Sudanese linked to DDoS cybercrime group, Anonymous Sudan, which caused $10m in damages
π Iranian Hackers Target Critical Infrastructure with Brute Force Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The ongoing campaign targets multiple critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Iranian Hackers Target Critical Infrastructure with Brute Force Attacks
The ongoing campaign targets multiple critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy
π North Korea Escalates Fake IT Worker Schemes to Extort Employers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Secureworks said it had observed a case where a fake North Korean IT contractor exfiltrated proprietary data before issuing a ransom demand to their former employer.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
North Korea Escalates Fake IT Worker Schemes to Extort Employers
Secureworks observed a case where a fake North Korean IT contractor exfiltrated proprietary data before issuing a ransom demand to their former employer
π¦
SolarWinds Releases Patches for High-Severity Vulnerabilities π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview SolarWinds has issued an important security update advisory outlining the latest vulnerability patches released for its products. This advisory provides insights into recently disclosed vulnerabilities affecting the SolarWinds range and emphasizes the need for organizations to take immediate action to protect their IT infrastructure. The advisory details various vulnerabilities and their associated risk scores, categorized by severity levels. High vulnerabilities, classified with a CVSS base score of 7.0 to 10.0, include three identified issues, specifically CVE202445714, CVE202445711, CVE202445710, and CVE202445715. These vulnerabilities carry a highrisk score and are marked with a Green TLP rating. In addition, there is one medium vulnerability, which falls within a...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
SolarWinds Releases Patches For High-Severity
SolarWinds releases patches for high-severity vulnerabilities. Immediate action is advised to secure affected products and protect IT infrastructure.
π¦
GitHub Releases Security Advisory on Critical Vulnerability in Self-Hosted Environments π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview GitHub has issued a security advisory regarding critical vulnerabilities that require immediate attention from users of the GitHub Enterprise Server GHES. This advisory highlights a specific vulnerability that could severely compromise organizations' security relying on this selfhosted version of GitHub, which is tailored for those needing to manage their infrastructure, security, and compliance. GitHub Enterprise Server is a platform that enables organizations to host their repositories while maintaining control over security protocols. However, vulnerabilities identified under the Common Vulnerabilities and Exposures CVE system and classified by the Common Vulnerability Scoring System CVSS indicate potential risks that must be addressed promptly. CVE20249487 is a ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
GitHub Alerts On Critical Vulnerability In Self-Hosted Environments
GitHub Warns Of Critical Vulnerabilities In GitHub Enterprise Server (GHES) That Require Immediate Patching To Secure Affected Versions
π΅οΈββοΈ Internet Archive Slowly Revives After DDoS Barrage π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Days after facing a major breach, the site is still struggling to get fully back on its feet.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Internet Archive Revives After DDoS Barrage
Days after facing a major breach, the site is still struggling to get fully back on its feet.