What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
globalsecuritymag.webp 2023-10-25 08:35:31 Hausse des sinistres cyber : les outils de détection et de réponse, de plus en plus importants (lien direct) Hausse des sinistres cyber : les outils de détection et de réponse, de plus en plus importants • Les incidents de ransomware repartent à la hausse, les pirates utilisant les exfiltrations de données et les attaques contre les chaînes d'approvisionnement pour maximiser leur efficacité. • L'analyse des grands sinistres cyber effectuée par Allianz Commercial met en évidence l'augmentation des exfiltrations de données, mais aussi des incidents rendus publics. • Les violations de données peuvent devenir 1 000 fois plus coûteuses si elles ne sont pas détectées et contenues rapidement. • En matière de cybersécurité, les entreprises doivent notamment s'attacher à renforcer leurs capacités de détection et de réponse. - Investigations Ransomware Tool ★★
News.webp 2023-10-25 08:30:06 Hunters International Fuite des photos de chirurgie plastique préopératoire en négociation non-non
Hunters International leaks pre-op plastic surgery pics in negotiation no-no
(lien direct)
Aucun honneur parmi les voleurs, car le groupe nie les liens de ransomware Hive Un gang de ransomware nouvellement émergé prétend avoir réussi à avoir eu accès aux systèmes d'une clinique de chirurgien plasticien américain, qui divulgue les patients \\ ''Images de pré-opération dans le but de dépêcher un paiement de rançon.…
No honor among thieves as group denies Hive ransomware links A newly emerged ransomware gang claims to have successfully gained access to the systems of a US plastic surgeon\'s clinic, leaking patients\' pre-operation pictures in an attempt to hurry a ransom payment.…
Ransomware ★★
DarkReading.webp 2023-10-24 20:56:00 2023 Ransomware attaque plus de 95% par rapport à 2022, selon le rapport Corvus Insurance Q3
2023 Ransomware Attacks Up More Than 95% Over 2022, According to Corvus Insurance Q3 Report
(lien direct)
Aucun honneur parmi les voleurs, car le groupe nie les liens de ransomware Hive Un gang de ransomware nouvellement émergé prétend avoir réussi à avoir eu accès aux systèmes d'une clinique de chirurgien plasticien américain, qui divulgue les patients \\ ''Images de pré-opération dans le but de dépêcher un paiement de rançon.…
No honor among thieves as group denies Hive ransomware links A newly emerged ransomware gang claims to have successfully gained access to the systems of a US plastic surgeon\'s clinic, leaking patients\' pre-operation pictures in an attempt to hurry a ransom payment.…
Ransomware Studies ★★★
DarkReading.webp 2023-10-24 20:00:00 Rencontrez Rhysida, une nouvelle souche de ransomware qui se supprime
Meet Rhysida, a New Ransomware Strain That Deletes Itself
(lien direct)
L'opération RAAS émergente utilise des ransomwares de Rhysida associés à un infostecteur méchant appelé Lumar, avertissent les chercheurs.
Emerging RaaS operation uses Rhysida ransomware paired with a wicked infostealer called Lumar, researchers warn.
Ransomware ★★
RecordedFuture.webp 2023-10-24 19:00:00 Neuberger: les nouvelles initiatives mondiales comprendront le partage d'informations, le suivi des paiements de ransomware
Neuberger: New global initiatives will include information sharing, ransomware payment tracking
(lien direct)
Une coalition mondiale de dirigeants du gouvernement de la cybersécurité annoncera des efforts visant à renforcer le partage d'informations sur les menaces numériques et à assumer des paiements néfastes de crypto-monnaie lorsqu'ils se réunissent à Washington la semaine prochaine, a déclaré mardi un haut responsable de la Maison Blanche.L'administration Biden devrait accueillir des fonctionnaires de 50 pays la semaine prochaine pour son compteur international
A global coalition of government cybersecurity leaders will announce efforts to boost information sharing about digital threats and take on nefarious cryptocurrency payments when they convene in Washington next week, a senior White House official said on Tuesday. The Biden administration is set to host officials from 50 countries next week for its International Counter
Ransomware Uber ★★★
globalsecuritymag.webp 2023-10-24 16:44:46 Zerto Research Report Semble Les entreprises n'ont pas de stratégie de ransomware complète
Zerto Research Report Finds Companies Lack a Comprehensive Ransomware Strategy
(lien direct)
Le rapport de recherche Zerto révèle que les entreprises n'ont pas de stratégie de ransomware complète Plus des deux tiers des entreprises interrogées n'ont pas de stratégie de ransomware qui se concentre sur la récupération - rapports spéciaux
Zerto Research Report Finds Companies Lack a Comprehensive Ransomware Strategy More than two-thirds of companies surveyed do not have a ransomware strategy that focuses on recovery - Special Reports
Ransomware ★★
globalsecuritymag.webp 2023-10-24 14:17:27 La police saisit les sites d\'extorsion du ransomware Ragnar Locker sur le dark web (lien direct) La police saisit les sites d'extorsion du ransomware Ragnar Locker sur le dark web, Benoit Grunemwald - Expert en Cybersécurité chez ESET France réagit. - Malwares Ransomware ★★
bleepingcomputer.webp 2023-10-24 11:07:21 L'équipe de basket-ball Asvel confirme la violation des données après une attaque de ransomware
ASVEL basketball team confirms data breach after ransomware attack
(lien direct)
L'équipe de basket-ball française LDLC Asvel (ASVEL) a confirmé que les données avaient été volées après que le gang de ransomware Noescape a affirmé avoir attaqué le club.[...]
French professional basketball team LDLC ASVEL (ASVEL) has confirmed that data was stolen after the NoEscape ransomware gang claimed to have attacked the club. [...]
Ransomware Data Breach ★★
SecureList.webp 2023-10-24 10:00:01 Stealer pour le système de paiement PIX, New Lumar Stealer et Rhysida Ransomware
Stealer for PIX payment system, new Lumar stealer and Rhysida ransomware
(lien direct)
Dans ce rapport, nous partageons nos dernières conclusions Crimeware: GOPIX Cibler le système de paiement PIX;Lumar volant des fichiers et des mots de passe;Ransomware Rhysida prenant en charge les anciennes fenêtres.
In this report, we share our latest crimeware findings: GoPIX targeting PIX payment system; Lumar stealing files and passwords; Rhysida ransomware supporting old Windows.
Ransomware ★★
InfoSecurityMag.webp 2023-10-24 08:30:00 Les attaques de ransomware de soins de santé coûtent 78 milliards de dollars
Healthcare Ransomware Attacks Cost US $78bn
(lien direct)
Comparerch calcule le coup économique à partir des temps d'arrêt depuis 2016
Comparitech calculates economic hit from downtime since 2016
Ransomware ★★
DarkReading.webp 2023-10-23 18:53:56 Ragnar Locker Ransomware Boss arrêté à Paris
Ragnar Locker Ransomware Boss Arrested in Paris
(lien direct)
Les COP suivent le développeur des ransomwares et saisissent l'infrastructure de casier Ragnar et le site de fuite de données, explique Europol.
Cops track down ransomware developer and seize Ragnar Locker infrastructure and data-leak site, Europol says.
Ransomware ★★
Cybereason.webp 2023-10-23 14:03:56 Toute la sécurité EPP n'est pas la même - changer le garde!
NOT all EPP Security is the Same - Changing the Guard!
(lien direct)
Toute la sécurité EPP n'est pas la même - changer la garde! Lorsque j'ai commencé à antivirus en 1991, la solution était simple: trouver un identifiant unique pour détecter les logiciels malveillants, alors vous pouvez le bloquer et si nécessaire, inciter les bonnes étapes programmatiques pour récupérer.Alan Salomon dirait que c'est un problème mathématique, nous avons la solution, et nous pouvons l'étendre infiniment.Cependant, au fil des ans, les menaces, les solutions et les environnements dans lesquels nous les déployons sont devenus de plus en plus complexes.Nous sommes passés à partir de virus de fichiers qui étaient un objet simple à des attaques de ransomwares multiples complexes composées de centaines d'éléments.Tout comme un exemple si vous regardez le Dernier test de mitres , il a utilisé Turla qui est composé de 143objets (indicateurs & amp; comportements liés à l'attaque). & nbsp;
NOT all EPP Security is the Same - Changing the Guard! When I started in anti-virus back in 1991, the solution was simple: find a unique identifier to detect the malware, then you could block it and if needed instigate the right programmatic steps to recover. Alan Solomon would say it\'s a math problem, we have the solution, and we can scale it infinitely. However, over the years threats, the solutions and the environments we deploy them into have become ever more complex. We have moved from file viruses that were one simple object to complex multifaceted ransomware attacks made up of hundreds of elements. Just as an example if you look at the latest MITRE testing, it used Turla which is made up of 143 objects (Indicators & behaviors linked to the attack). 
Ransomware ★★★
SocRadar.webp 2023-10-23 13:04:31 Mois de la cyberintimidation: retrait de Trigona, Ransomware Ransomware Resurges, RansomedForum et New Raas \\ 'qbit \\'
Cyber Awakeness Month: Takedown of Trigona, Hive Ransomware Resurges, RansomedForum and New RaaS \\'qBit\\'
(lien direct)
du retrait de Trigona à la résurgence des ransomwares de ruche, et l'émergence de ...
From the takedown of Trigona to the resurgence of Hive Ransomware, and the emergence of...
Ransomware ★★
Checkpoint.webp 2023-10-23 13:00:45 Dans le cyber-abîme: les prédictions de Riveting 2024 de Check Point \\ révèlent une tempête de l'IA, du hacktivisme et des fasks profonds armés
Into the Cyber Abyss: Check Point\\'s Riveting 2024 Predictions Reveal a Storm of AI, Hacktivism, and Weaponized Deepfakes
(lien direct)
Les activités criminelles ont bondi au premier semestre, avec des recherches sur le point de contrôle (RCR) signalant une augmentation de 8% des cyberattaques hebdomadaires mondiales au deuxième trimestre, marquant le volume le plus élevé en deux ans.Les menaces familières telles que le ransomware et le hacktivisme ont évolué, les gangs criminels modifiant leurs méthodes et outils pour infecter et affecter les organisations du monde entier.Même les technologies héritées telles que les périphériques de stockage USB ont repris la popularité en tant que véhicule pour répandre les logiciels malveillants.L'un des développements les plus importants de cette année a été l'évolution du paysage des ransomwares.Les données dérivées de plus de 120 «sites de honte» ransomwares ont révélé que dans le premier [& # 8230;]
Criminal activities surged in the first half of the year, with Check Point Research (CPR) reporting an 8% increase in global weekly cyberattacks in the second quarter, marking the highest volume in two years. Familiar threats such as ransomware and hacktivism have evolved, with criminal gangs modifying their methods and tools to infect and affect organizations worldwide. Even legacy technology such as USB storage devices regained popularity as a vehicle to spread malware. One of the most significant developments this year was the evolution of the ransomware landscape. Data derived from over 120 ransomware “shame-sites” revealed that in the first […]
Ransomware Tool Prediction ★★★
AlienVault.webp 2023-10-23 10:00:00 Planification de la continuité des activités: en regardant en arrière ou à l'avance
Business continuity planning: Looking back or ahead
(lien direct)
In September 2023, cybercriminals launched an extensive ransomware attack that disrupted several major businesses in the Las Vegas Casino Business/District. The attack shook the city and stopped consumer goods and services for several hours. The attack influenced security, visitor services, and financial activities. Businesses lost money and long-term reputational risks ensued.  Increasing op tempo A company can keep running after a disruption if it has a comprehensive Business Continuity Plan (BCP) that includes risk assessments, Business Impact Assessments (BIAs), and recovery strategies. A BCP is needed to minimize risk apprehensions, reduce financial loss, and maintain continuous business operations. A business impact analysis (BIA) must be part of Business Continuity Plans (BCPs). The plan sets recovery time and point goals, ranks the most important processes, and figures out how delays will affect business functions. BIAs help organizations figure out what tools and plans they need for recovery. Disaster Recovery Plans, or DRPs, lay out how a business will handle and rebound from a disaster. It includes tools for recovering systems, data, and infrastructure. A complete, well-tested DRP is necessary to keep problems to a minimum and get services back up and running quickly. To stay safe from cyber threats, businesses need to put their operating security footprint at the top of their list of priorities. In this way, networks, systems, apps, and data are kept safe. Data breaches and unauthorized access are less likely to happen with firewalls, intrusion detection systems, and encryption methods. Rearview The ransomware attack on the Las Vegas Casino Business/District in September 2023 shows that current risk management methods need to be looked at and updated. These steps cut down on operational disruptions, keep customer goods and services safe, and speed up the recovery of mission-critical systems. Being operationally ready is important for protecting your business and preparing for the unexpected. The most common way for threat players to take over a company\'s resources, assets, and people is through ransomware attacks. Recent statistics show that strong holding the most sought-after security principles can disrupt present business operations: The State of Ransomware Report in the US says that the average ransomware attack costs $8.1 million and takes 287 days to fix (Emsisoft, 2021). The number of ransom payments made by victims rose by 311% in 2020 (Crypto Crime Report, 2021). Going forward Ransomware attacks affect people all over the world, resulting in huge financial losses costs - compiled worldwide topping $20 billion in 2020. The COVID-19 pandemic has given hackers new avenues and threat vectors to hack, crack, and exploit. It is imperative for businesses to strengthen the home front to gain home-field advantage against cyber threat actors.  Having a comprehensive, repeatable, verifiable disaster recovery and business continuity plan minimizes the economic im Ransomware Tool Vulnerability Threat ★★
InfoSecurityMag.webp 2023-10-23 08:30:00 Police Dismante Ragnar Locker Ransomware Group
Police Dismantle Ragnar Locker Ransomware Group
(lien direct)
Variante prolifique infrastructure fréquemment ciblée
Prolific variant frequently targeted critical infrastructure
Ransomware ★★
Blog.webp 2023-10-23 02:24:33 2023 août & # 8211;Rapport de tendance des menaces sur les statistiques des ransomwares et les problèmes majeurs
2023 Aug – Threat Trend Report on Ransomware Statistics and Major Issues
(lien direct)
Ce rapport fournit des statistiques sur le nombre de nouveaux échantillons de ransomware, des systèmes ciblés et des entreprises ciblées en août 2023, ainsi que des problèmes de ransomware notables en Corée et dans d'autres pays.Tendances clés 1) Tactiques de pression élargies des ransomwares sur les entreprises ciblées 2) Rhysida Ransomware Connection avec la vice Society 3) Monti Ransomware a introduit une nouvelle technique de chiffrement Linux Aug_Thereat Trend Rapport sur les statistiques des ransomwares et les principaux problèmes
This report provides statistics on the number of new ransomware samples, targeted systems, and targeted businesses in August 2023, as well as notable ransomware issues in Korea and other countries. Key Trends 1) CLOP ransomware expanded pressure tactics on targeted businesses 2) Rhysida ransomware connection with Vice Society 3) Monti ransomware introduced new Linux encryption technique Aug_Threat Trend Report on Ransomware Statistics and Major Issues
Ransomware Threat Prediction ★★
Blog.webp 2023-10-23 02:22:46 2023 Jul & # 8211;Rapport sur la tendance des menaces du Web Deep et Dark
2023 Jul – Deep Web and Dark Web Threat Trend Report
(lien direct)
Ce rapport de tendance sur le Web Deep et le Web sombre d'août 2023 est sectionné en ransomware, forums & # & #38;Marchés noirs et acteurs de menace.Nous tenons à dire à l'avance qu'une partie du contenu n'a pas encore été confirmée comme vraie.1) Ransomware (1) Alphv (Blackcat) (2) Lockbit (3) NoEscape (4) Metaencryptor (5) Rhysida 2) Forum & # 38;Black Market (1) Le retour du voleur de raton laveur (2) Anonfiles a fermé (3) violation de données du site Web d'apprentissage des langues étrangères 3) ...
This trend report on the deep web and dark web of August 2023 is sectioned into Ransomware, Forums & Black Markets, and Threat Actors. We would like to state beforehand that some of the content has yet to be confirmed to be true. 1) Ransomware (1) ALPHV (BlackCat) (2) LockBit (3) NoEscape (4) MetaEncryptor (5) Rhysida 2) Forum & Black Market (1) The Return of Raccoon Stealer (2) Anonfiles Shut Down (3) Data Breach of Foreign Language Learning Website 3)...
Ransomware Data Breach Threat Prediction ★★
The_Hackers_News.webp 2023-10-21 18:40:00 Europol démantèle une infrastructure de ransomware Ragnar Locker, développeur NABS Key
Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key Developer
(lien direct)
Vendredi, Europol a annoncé le retrait de l'infrastructure associée aux ransomwares de casier Ragnar, parallèlement à l'arrestation d'une "cible clé" en France. "Dans une action effectuée entre le 16 et le 20 octobre, des recherches ont été effectuées en Tchéchie, en Espagne et en Lettonie", a indiqué l'agence."L'auteur principal, soupçonné d'être un développeur du groupe Ragnar, a été amené devant l'examen
Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside the arrest of a "key target" in France. "In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain, and Latvia," the agency said. "The main perpetrator, suspected of being a developer of the Ragnar group, has been brought in front of the examining
Ransomware ★★
bleepingcomputer.webp 2023-10-21 11:05:10 The Week in Ransomware - 20 octobre 2023 - Right Back
The Week in Ransomware - October 20th 2023 - Fighting Back
(lien direct)
Ce fut une mauvaise semaine pour les ransomwares, le ransomware Trigona souffrant d'une violation de données et des forces de l'ordre perturbant le fonctionnement du ragnarlocker.[...]
This was a bad week for ransomware, with the Trigona ransomware suffering a data breach and law enforcement disrupting the RagnarLocker ransomware operation. [...]
Ransomware Data Breach ★★
Blog.webp 2023-10-20 21:35:22 Gang de ransomware de casser
Ragnar Locker Ransomware Gang Dismantled, Key Suspect Arrested, Site Seized
(lien direct)
> Par waqas Les forces de l'ordre mondiales impliquant 11 pays ont arrêté le gang de ransomware de casier Ragnar. Ceci est un article de HackRead.com Lire la publication originale: Ragnar Locker Ransomware Gang démantelé, clé suspecte arrêtée, site saisi
>By Waqas Global law enforcement involving 11 countries has shuts down Ragnar Locker ransomware gang. This is a post from HackRead.com Read the original post: Ragnar Locker Ransomware Gang Dismantled, Key Suspect Arrested, Site Seized
Ransomware ★★★
RecordedFuture.webp 2023-10-20 17:28:00 Europol: \\ 'cible clé \\' dans l'opération de ransomware de casier Ragnar arrêté à Paris
Europol: \\'Key target\\' in Ragnar Locker ransomware operation arrested in Paris
(lien direct)
Une «cible clé» qui aurait été impliquée dans le Ragnar Locker Ransomware Group a été arrêtée lundi à Paris, selon des responsables d'Europol.Le annonce , fait vendredi, est le premier mot officiel des forces de l'ordre après que le site de fuite du gang \\ était Remplacé par une bannière mettant en vedette les insignes de plusieurs agences jeudi.Europol a déclaré la loi
A “key target” allegedly involved with the Ragnar Locker ransomware group was arrested in Paris on Monday, according to officials at Europol. The announcement, made Friday, is the first official word from law enforcement after the gang\'s leak site was replaced with a banner featuring the insignias of several agencies on Thursday. Europol said law
Ransomware ★★
Checkpoint.webp 2023-10-20 15:00:32 Sélection de l'éducation: Marple Newtown School District s'associe à Check Point pour protéger les étudiants et les employés
Safeguarding Education: Marple Newtown School District Partners with Check Point to Protect Students and Employees
(lien direct)
> Alors que les écoles des États-Unis commencent une nouvelle année académique, la menace imminente des cyberattaques jette une ombre sur l'industrie de l'éducation.Selon Check Point Research, le secteur de l'éducation est l'une des industries les plus attaquées par les ransomwares.Le ransomware peut entraîner la perte de données sensibles et personnelles des élèves et des enseignants.Et selon le US Government Accountability Office, les cyberattaques peuvent également entraîner une perte de temps d'apprentissage allant de trois jours à trois semaines, en plus des pertes financières pour les districts scolaires entre 50 000 $ et 1 million de dollars.Protéger les informations sensibles des cyberattaquants est [& # 8230;]
>As schools across the United States are beginning a new academic year, the looming threat of cyberattacks casts a shadow over the education industry. According to Check Point Research, the education sector is one of the most attacked industries by ransomware. Ransomware can lead to the loss of sensitive and personal data from students and teachers. And according to the U.S. Government Accountability Office, cyber-attacks can also cause a loss of learning time ranging from three days to three weeks, in addition to financial losses for school districts between $50,000 to $1 million. Protecting sensitive information from cyber attackers is […]
Ransomware Threat ★★
SecurityWeek.webp 2023-10-20 14:32:22 Les autorités prennent le contrôle du site Web sombre du ragnarlocker ransomware
Authorities Seize Control of RagnarLocker Ransomware Dark Web Site
(lien direct)
> Le site de fuite du groupe sombre du Ransomware Group du Ragnarlocker a été saisi dans une opération coordonnée d'application de la loi.
>The RagnarLocker ransomware group\'s dark web leak site has been seized in a coordinated law enforcement operation.
Ransomware ★★
DarkReading.webp 2023-10-19 19:33:00 Europol Strike Wounds Ragnar Locker Ransomware Group (lien direct) Plusieurs pays d'Europe ainsi que des États-Unis et du Japon ont participé à l'opération, qui vise à défangler l'un des plus grands noms du ransomware.
Several countries in Europe as well as the United States and Japan were involved in the operation, which is aimed at defanging one of the bigger names in ransomware.
Ransomware ★★★
RecordedFuture.webp 2023-10-19 19:15:00 Les préoccupations se développent à mesure que les imitations de verrouillage ciblent de plus en plus les vulnérabilités populaires
Concerns grow as LockBit knockoffs increasingly target popular vulnerabilities
(lien direct)
Les pirates utilisent une boîte à outils divulguée utilisée pour créer des versions de bricolage du ransomware de verrouillage populaires, ce qui facilite même les cybercriminels amateurs pour cibler les vulnérabilités communes.Le Gang de ransomware de verrouillage , qui a attaqué des milliers d'organisations à travers le monde, a fait divulguer la boîte à outils en septembre 2022 par un affilié à tristesse .Les experts ont immédiatement exprimé des préoccupations
Hackers are using a leaked toolkit used to create do-it-yourself versions of the popular LockBit ransomware, making it easy for even amateur cybercriminals to target common vulnerabilities. The LockBit ransomware gang, which has attacked thousands of organizations across the world, had the toolkit leaked in September 2022 by a disgruntled affiliate. Experts immediately expressed concerns
Ransomware Vulnerability ★★
News.webp 2023-10-19 16:30:08 Europol frappe le Ragnarlocker hors ligne dans le deuxième grand buste des ransomwares cette année
Europol knocks RagnarLocker offline in second major ransomware bust this year
(lien direct)
Le groupe restera dans les mémoires comme un négociateur fidèle et un intimidateur d'infrastructures critiques orgs Les organismes d'application de la loi ont repris le site de fuite de Ransomware Group de Ragnarlocker dans un Takedown coordonné internationalement.…
Group will be remembered as staunch negotiator and a bullier of critical infrastructure orgs Law enforcement agencies have taken over RagnarLocker ransomware group\'s leak site in an internationally coordinated takedown.…
Ransomware ★★
RecordedFuture.webp 2023-10-19 16:15:00 Site de ransomware Ragnar Locker Ransomware par le FBI, Europol
Ragnar Locker ransomware site taken down by FBI, Europol
(lien direct)
Le site de fuite du gang ransomware prolifique Ragnar Locker a été remplacé par un avis de retrait du FBI, d'Europol et de plusieurs organismes d'application de la loi en Europe jeudi.Dans une déclaration à Recred Future News, un porte-parole d'Europol a déclaré qu'ils ne pouvaient pas divulguer plus d'informations sur l'opération parce que «un certain nombre d'actions sont toujours
The leak site of the prolific ransomware gang Ragnar Locker was replaced with a takedown notice from the FBI, Europol and several law enforcement agencies in Europe on Thursday. In a statement to Recorded Future News, a Europol spokesperson said they cannot release more information about the operation because “a number of actions are still
Ransomware ★★★
zataz.webp 2023-10-19 14:17:19 Piratage du leader de la plaisance mondiale : Brunswick s\'explique (lien direct) Juin 2023, des pirates informatiques s'invitent dès les serveurs du leader mondial de la navigation de plaisance. Cinq mois plus tard, Brunswick revient sur sa fuite de données.... Ransomware ★★★
bleepingcomputer.webp 2023-10-19 10:39:39 Les sites d'extorsion Web sombres de Ragnar Locker Ransomware ont été saisis par la police
Ragnar Locker ransomware\\'s dark web extortion sites seized by police
(lien direct)
Le Ragnar Locker Ransomware Operation \'s TOR La négociation et les sites de fuite de données ont été saisis jeudi matin dans le cadre d'une opération internationale d'application de la loi.[...]
The Ragnar Locker ransomware operation\'s Tor negotiation and data leak sites were seized Thursday morning as part of an international law enforcement operation. [...]
Ransomware
AlienVault.webp 2023-10-19 10:00:00 Pourquoi les organisations ne détectent-elles pas les menaces de cybersécurité?
Why are organizations failing to detect cybersecurity threats?
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  With the changing security landscape, the most daunting task for the CISO and CIO is to fight an ongoing battle against hackers and cybercriminals. Bad actors stay ahead of the defenders and are always looking to find new vulnerabilities and loopholes to exploit and enter the business network. Failing to address these threats promptly can have catastrophic consequences for the organization. A survey finds that, on average, it takes more than five months to detect and remediate cyber threats. This is a significant amount of time, as a delayed response to cyber threats can result in a possible cyber-attack.  One can never forget the devastating impacts of the Equifax breach in 2017 and the Target breach in 2013  due to delayed detection and response. This is concerning and highlights the need for proactive cybersecurity measures to detect and mitigate rising cyber threats. Amidst this, it\'s also crucial to look into why it is challenging to detect cyber threats. Why do organizations fail to detect cyber threats? Security teams are dealing with more cyber threats than before. A report also confirmed that global cyber attacks increased by 38% in 2022 compared to the previous year. The increasing number and complexity of cyber-attacks make it challenging for organizations to detect them. Hackers use sophisticated techniques to bypass security systems and solutions - like zero-day vulnerabilities, phishing attacks, business email compromises (BEC), supply chain attacks, and Internet of Things (IoT) attacks. Some organizations are unaware of the latest cyber threat trends and lack the skills and resources to detect them. For instance, hackers offer professional services like ransomware-as-a-service (RaaS) to launch ransomware attacks. Surprisingly, two out of three ransomware attacks are facilitated by the RaaS setup, but still, companies fail to have a defensive strategy against them. Enterprises relying on legacy devices and outdated software programs are no longer effective at recognizing certain malicious activities, leaving the network vulnerable to potential threats. Additionally, the lack of trained staff, insider threats, and human errors are other reasons why many organizations suffer at the hands of threat actors. Besides this, much of the company\'s data is hidden as dark data. As the defensive teams and employees may be unaware of it, the hackers take complete advantage of dark data and either replicate it or use it to fulfill their malicious intentions. Moreover, cloud migration has rapidly increased in recent years, putting cybersecurity at significant risk. The complexity of the cloud environments, poorly secured remote and hybrid work environments, and sharing security responsibilities between cloud service providers and clients have complicated the situation. In addition, cloud vulnerabilities, which have risen to 194% from the previous year, have highlighted the need for organizations to look out for ways to strengthen their security infrastructure. Security measures to consider to prevent cyber threats Since businesses face complex cyber threats, mitigating them require Ransomware Data Breach Tool Vulnerability Threat Cloud Equifax ★★
InfoSecurityMag.webp 2023-10-19 09:30:00 Groupe de pirate GhostSec dévoile l'implant de ransomware de nouvelle génération
Hacker Group GhostSec Unveils New Generation Ransomware Implant
(lien direct)
Le groupe ex-hacktiviste est désormais pleinement impliqué dans le marché des ransomwares en tant que service
The ex-hacktivist group is now fully involved with the ransomware-as-a-service market
Ransomware ★★★
NetworkWorld.webp 2023-10-19 02:00:00 Startup de sécurité AirGap Networks apporte des technologies de télécommunications au LAN
Security startup Airgap Networks brings telco technologies to the LAN
(lien direct)
Les logiciels malveillants générateurs de l'AI, l'usurpation de faux identité profonde et les ransomwares parrainés par l'État ne sont que quelques-unes des dernières méthodes que les attaquants utilisent pour contourner les outils de cybersécurité traditionnels.Ritesh Agrawal, PDG de Cybersecurity Startup AirGap Networks, a remarqué que de nombreuses attaques qui compromettent les réseaux d'entreprise ne parviennent pas à pénétrer les réseaux de télécommunications et de prestataires de services. «Même s'ils déploient les mêmes routeurs, les mêmes routeurs, les commutateurs, et des pare-feu, il y a quelque chose de fondamentalement différent dans les réseaux de télécommunications qui les protègent de nombreuses menaces pour les Lans d'entreprise », a déclaré Argawal.Agrawal a 20 ans d'expérience avec la cybersécurité, le réseautage d'entreprise et le cloud computing, la plupart du temps passé avec les réseaux de genévriers en se concentrant sur les télécommunications et les grands clients d'entreprise. Pour lire cet article en totalité, veuillez cliquer ici
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they\'re deploying the same routers, switches, and firewalls, there\'s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here
Ransomware Malware Tool Cloud ★★
bleepingcomputer.webp 2023-10-18 19:17:43 Les militants ukrainiens piratent le gang de ransomware Trigona, les serveurs essuyés
Ukrainian activists hack Trigona ransomware gang, wipe servers
(lien direct)
Un groupe de cyber-activistes sous la bannière ukrainienne de la cyber-alliance a piraté les serveurs du gang de ransomware Trigona et les a essuyés après avoir copier toutes les informations disponibles.[...]
A group of cyber activists under the Ukrainian Cyber Alliance banner has hacked the servers of the Trigona ransomware gang and wiped them clean after copying all the information available. [...]
Ransomware Hack ★★★★
SocRadar.webp 2023-10-18 16:37:41 Ghostlocker: une nouvelle génération de ransomwares en tant que service (RAAS)
GhostLocker: A New Generation of Ransomware as a Service (RaaS)
(lien direct)
Ces derniers temps, nous avons assisté à une forte augmentation des attaques de ransomwares, une tendance déconcertante ...
In recent times, we have witnessed a sharp uptick in ransomware attacks, a disconcerting trend...
Ransomware ★★
RecordedFuture.webp 2023-10-18 15:45:00 Le groupe pro-ukraine dit qu'il a abattu le site Web de Ransomware Trigona
Pro-Ukraine group says it took down Trigona ransomware website
(lien direct)
Un groupe de hacktivistes pro-ukraine connus sous le nom de Cyber Alliance ukrainien dit qu'il a fermé le site de fuite géré par le groupe Ransomware Trigona.Selon le porte-parole de l'alliance, qui passe par l'alias en ligne "Herm1t", les hacktivistes ont anéanti 10 des serveurs de Trigona Gang \\, ont défait son site Web et les données exfiltrées
A group of pro-Ukraine hacktivists known as the Ukrainian Cyber Alliance says it has shut down the leak site run by the Trigona ransomware group. According to the spokesperson for the alliance, who goes by the online alias "herm1t," the hacktivists wiped out 10 of the Trigona gang\'s servers, defaced its website and exfiltrated data
Ransomware ★★
AlienVault.webp 2023-10-18 12:00:00 Obtenez le rapport AT & amp; T Cybersecurity Insights Rapport: Focus sur la vente au détail
Get the AT&T Cybersecurity Insights Report: Focus on Retail
(lien direct)
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Retail. The report examines the edge ecosystem, surveying retail IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on retail report documented how we secure the data, applications, and endpoints that rely on edge computing (get the 2022 report). Get the complimentary 2023 report.   The robust quantitative field survey reached 1,418 security, IT, application development, and line of business professionals worldwide. The qualitative research tapped subject matter experts across the cybersecurity industry. Retail-specific respondents equal 201. At the onset of our research, we established the following hypotheses. Momentum edge computing has in the market. Approaches to connecting and securing the edge ecosystem – including the role of trusted advisors to achieve edge goals. Perceived risk and perceived benefit of the common use cases in each industry surveyed. The results focus on common edge use cases in seven vertical industries – healthcare, retail, finance, manufacturing, energy and utilities, transportation, and U.S. SLED- delivering actionable advice for securing and connecting an edge ecosystem, including external trusted advisors. Finally, it examines cybersecurity and the broader edge ecosystem of networking, service providers, and top use cases. The role of IT is shifting, embracing stakeholders at the ideation phase of development. Edge computing is a transformative technology that brings together various stakeholders and aligns their interests to drive integrated business outcomes. The emergence of edge computing has been fueled by a generation of visionaries who grew up in the era of smartphones and limitless possibilities. Look at the infographic below for a topline summary of key findings in the retail industry. In this paradigm, the role of IT has shifted from being the sole leader to a collaborative partner in delivering innovative edge computing solutions. In addition, we found that retail leaders are budgeting differently for edge use cases. These two things, along with an expanded approach to securing edge computing, were prioritized by our respondents in the 2023 AT&T Cybersecurity Insights Report: Edge Ecosystem. One of the most promising aspects of edge computing is its potential to effectively use near-real-time data for tighter control of variable operations such as inventory and supply chain management that deliver improved operational efficiency. Adding new endpoints is essential for collecting the data, but how they’re connected can make them vulnerable to cyberattacks. Successful cyberattacks can disrupt services, highlighting the need for robust cybersecurity measures. Edge computing brings the data closer to where decisions are made. With edge computing, the intelligence required to make decisions, the networks used to capture and transmit data, and the use case management are distributed. Distributed means things work faster because nothing is backhauled to a central processing area such as a data center and delivers the near-real-time experience. With this level of complexity, it’s common to re-evaluate decisions regarding security, data storage, or networking. The report shares emerging trends as retail continues exploring edge computing use cases. One area that’s examined is expense allocation, and what we found may Ransomware Studies ★★★
News.webp 2023-10-18 09:15:08 Les escrocs malveillants trouvent une mise à jour de fausses navigateurs, au cas où les vrais ne seraient pas assez mauvais
Malware crooks find an in with fake browser updates, in case real ones weren\\'t bad enough
(lien direct)
Les chercheurs disent que le ransomware pourrait être à l'horizon si le succès se poursuit Une augmentation des cybercriminels masquant les téléchargements malveillants car de fausses mises à jour du navigateur sont repérées par des chercheurs en sécurité.…
Researchers say ransomware could be on the horizon if success continues An uptick in cybercriminals masking malicious downloads as fake browser updates is being spotted by security researchers.…
Ransomware Malware ★★
RecordedFuture.webp 2023-10-17 20:15:00 Le gouvernement chilien met en garde contre les attaques de ransomwares noirs de Basta après incident de douane
Chilean government warns of Black Basta ransomware attacks after customs incident
(lien direct)
Le gouvernement du Chili a mis en garde contre les attaques de ransomwares par une gang notoire de pirates après que son service des douanes ait traité mardi un incident.Les responsables du Chili \'s Servicio Nacional de Aduanas de Chili & # 8211;le ministère du gouvernement en charge du commerce extérieur, des importations et plus & # 8211;a déclaré mardi après-midi qu'ils ont pu
The government of Chile warned of ransomware attacks by a notorious gang of hackers after its customs department dealt with an incident on Tuesday. Officials from Chile\'s Servicio Nacional de Aduanas de Chile – the government department in charge of foreign trade, imports and more – said on Tuesday afternoon that they were able to
Ransomware ★★
knowbe4.webp 2023-10-17 18:40:56 Les cyber-assureurs notent que les revendications de ransomware ont augmenté de manière significative au premier semestre de 2023
Cyber Insurers Notes Ransomware Claims Rose Significantly in the First Half of 2023
(lien direct)

Cyber Insurers Notes Ransomware Claims Rose Significantly in the First Half of 2023
Ransomware ★★
RecordedFuture.webp 2023-10-17 13:30:00 Géant des ventes de publicité télévisée affectée par l'attaque des ransomwares
TV advertising sales giant affected by ransomware attack
(lien direct)
Une entreprise de vente et de technologie de publicité télévisée appartenant aux trois plus grands opérateurs de câblodistribution américaine a été frappée par une attaque de ransomware ces dernières semaines qui a affecté les opérations.AmperSand - appartenant à Comcast Corporation, Charter Communications et Cox Communications - fournit des données d'audience aux annonceurs d'environ 85 millions de ménages et existe depuis 1981.
A television advertising sales and technology company joinly owned by the three largest U.S. cable operators was hit with a ransomware attack in recent weeks that affected operations. Ampersand - owned by Comcast Corporation, Charter Communications and Cox Communications - provides viewership data to advertisers about 85 million households and has existed since 1981. Last
Ransomware ★★
InfoSecurityMag.webp 2023-10-16 15:30:00 Ransomware cible les serveurs WS_FTP non corrigés
Ransomware Targets Unpatched WS_FTP Servers
(lien direct)
Les acteurs de la menace ont tenté d'escalader les privilèges en utilisant l'outil open source Godpotato
The threat actors attempted to escalate privileges using the open-source GodPotato tool
Ransomware Tool Threat ★★
Checkpoint.webp 2023-10-16 14:04:05 16 octobre & # 8211;Rapport de renseignement sur les menaces
16th October – Threat Intelligence Report
(lien direct)
> Pour les dernières découvertes de cyber-recherche pour la semaine du 9 octobre, veuillez télécharger notre bulletin Threat_Intelligence.Les meilleurs attaques et violations Gang de ransomware de verrouillage ont revendiqué la responsabilité d'une prétendue attaque contre le revendeur de produits et services informatiques de plusieurs milliards de dollars CDW.Le gang a demandé une rançon de 80 millions de dollars et a menacé de publier des données volées, censées [& # 8230;]
>For the latest discoveries in cyber research for the week of 9th October, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES LockBit ransomware gang has claimed responsibility for an alleged attack on the multibillion-dollar IT products and services reseller CDW. The gang has demanded $80M ransom and threatened to release stolen data, said to […]
Ransomware Threat ★★
InfoSecurityMag.webp 2023-10-16 11:30:00 Le secteur des soins de santé a mis en garde contre le nouveau groupe de ransomwares Noescape
Healthcare Sector Warned About New Ransomware Group NoEscape
(lien direct)
Le gouvernement américain a souligné les opérations du groupe Noescape, qui serait un changement de marque de l'acteur de menace russe Avaddon
The US government highlighted the operations of the NoEscape group, which is believed to be a rebrand of Russian threat actor Avaddon
Ransomware Threat Medical ★★
ProofPoint.webp 2023-10-16 07:29:59 Navigation du cyber-risque: ce qu'il faut rechercher dans la couverture de la cyber-assurance
Navigating Cyber Risk: What to Look for in Cyber Insurance Coverage
(lien direct)
Modern threats like phishing, ransomware and data breaches cast a dark cloud over businesses across sectors. For most bad actors, the goal of an attack is financial. As Proofpoint noted in the 2023 State of the Phish report, 30% of businesses that endured a successful attack experienced a direct monetary loss, such as a fraudulent invoice, wire transfer or payroll redirection. That is an increase of 76% year over year.   A cyber insurance policy can protect you from the financial losses caused by cybersecurity incidents and data breaches. And when businesses pair cyber insurance with the prowess of Proofpoint solutions, they can build a formidable defense strategy. In this blog, we\'ll go over some best practices for choosing and managing you cyber insurance policy so you can protect yourself from risk.   Actions that cyber criminals monetize  Our research for the latest State of the Phish report shows that the three most common consequences of a cyber attack are:  Data breach (44%)  Ransomware infection (43%)  Account compromise (36%)   Notably, cyber criminals can monetize all these actions.  Most common results of successful phishing attacks. (Source: 2023 State of the Phish report from Proofpoint.)  Just one cybersecurity incident can cost tens of thousands of dollars. So, it\'s easy to understand why insurers see these incidents as too costly to cover in their general liability policies. But with cyber insurance, your business has a tool to help manage risk.  Why cyber insurance can be a vital financial safety net   While firewalls and endpoint protections remain vital, the truth is that a level of residual risk always exists. No matter how fortified your security is, breaches can happen due to ingenious adversaries, human error or just unfortunate circumstances.   This is where cyber insurance comes to the rescue. It is the safety net that catches your business when your defenses fall short. It can help you cover costs like ransomware payments, legal fees, and costs associated with crisis management and revenue loss.   In the graphic below, we can see how often cyber insurance covered losses from ransomware attacks among those surveyed for our 2023 State of the Phish report.     Nearly three-quarters (73%) of businesses with cyber insurance policies said their insurers paid at least some of their ransomware-related losses. (Source: 2023 State of the Phish report from Proofpoint.)  Cyber insurance best practices   Now that we\'ve covered why cyber insurance can be a vital financial safety net, let\'s look at some essential best practices for cyber insurance. These measures can help your business become more effective at managing cybersecurity risks.  Find an expert and ask for support and guidance. Specialized brokers are your allies in the intricate world of cyber insurance. Insurers vary in risk appetite, claim acceptance rates and expertise. Brokers have an in-depth grasp of this landscape, and they will assess your options meticulously. They will help ensure that the policy you choose is the right fit for your industry, size, risk profile and more.  Be prepared for a rigorous assessment. Today, insurers want more insight into your company\'s security protocols and controls before they issue a cyber insurance policy. So preparedness is key. Be ready to provide evidence, like external audits, penetration test results and compliance certifications to insurers. If you implement access controls that insurers deem vital, such as multifactor authentication (MFA) and privileged access management (PAM), it may help to reduce your premiums.  Closely examine coverage scope. Coverage specifics vary globally. But you will find that most cyber insurance policies cover a portion of losses from ransomware attacks and expenses linked to crisis responses.  You need to have a thorough understanding of the breach scenarios your policy does or does not cover. Take note of any exclusions. Also, be sure to scrutinize services like breach investigation support, legal Ransomware Tool Threat Guideline Cloud ★★★
RecordedFuture.webp 2023-10-16 04:00:00 Les tribunaux du Kansas ont fermé, les systèmes électroniques ont baissé après une prétendue attaque de ransomware
Kansas courts closed, electronic systems down after alleged ransomware attack
(lien direct)
Les tribunaux du Kansas sont confrontés à une variété de problèmes à la suite d'une prétendue attaque de ransomware la semaine dernière.La ville de Topeka a annoncé dimanche que ses divisions de la Cour municipale et de sa probation et de ses poursuites seront fermées au public lundi, tandis que la Cour suprême du Kansas utilise exclusivement des dossiers papier pour opérer.Juge Philip Journey, de
Courts across Kansas are facing a variety of issues following an alleged ransomware attack last week. The city of Topeka announced Sunday that its municipal court and probation and prosecution divisions will be closed to the public on Monday, while the Kansas Supreme Court is exclusively using paper records to operate. Judge Philip Journey, of
Ransomware ★★★
News.webp 2023-10-16 02:58:14 Le régulateur, les assureurs et les clients viennent tous pour les progrès après la violation de Moveit
Regulator, insurers and customers all coming for Progress after MOVEit breach
(lien direct)
De plus, CISA catalogage de nouveaux points de données de ransomware, des sites WP 17K détournés par malware en septembre, et des vulns plus critiques infosec en bref les retombées de l'exploitation des boguesIn Progress Software \'s Moveit File Transfer Software se poursuit, la Commission américaine des Securities and Exchange (SEC) enquête désormais sur l'affaire et de nombreuses parties touchées à la rémunération.…
Also, CISA cataloging new ransomware data points, 17k WP sites hijacked by malware in Sept., and more critical vulns Infosec in brief  The fallout from the exploitation of bugs in Progress Software\'s MOVEit file transfer software continues, with the US Securities and Exchange Commission (SEC) now investigating the matter, and lots of affected parties seeking compensation. …
Ransomware Malware ★★★
RecordedFuture.webp 2023-10-15 21:45:00 Colonial Pipeline attribue les prétentions des ransomwares à \\ 'non liée à la violation de données tierces
Colonial Pipeline attributes ransomware claims to \\'unrelated\\' third-party data breach
(lien direct)
Colonial Pipeline a déclaré qu'il n'y avait pas eu de perturbation des opérations de pipeline ou de leurs systèmes après qu'un gang de ransomware a fait plusieurs menaces vendredi après-midi.La société & # 8211;qui gère le plus grand système de pipeline pour les produits à l'huile raffinés aux États-Unis & # 8211;adressé les affirmations faites par le gang rancéd.vc que les données avaient été volées à leur
Colonial Pipeline said there has been no disruption to pipeline operations or their systems after a ransomware gang made several threats on Friday afternoon. The company – which runs the largest pipeline system for refined oil products in the U.S. – addressed claims made by the Ransomed.vc gang that data had been stolen from their
Ransomware Data Breach ★★★
Blog.webp 2023-10-14 01:43:36 Colonial Pipeline nie la violation de RansomEdVC Ransomware Group
Colonial Pipeline Denies Breach by RANSOMEDVC Ransomware Group
(lien direct)
> Par waqas violation de données tierce suspectée dans les fichiers en ligne liés au pipeline colonial. Ceci est un article de HackRead.com Lire le post original: pipeline colonialRefuse la violation de Ransomedvc Ransomware Group
>By Waqas Third-Party Data Breach Suspected in Online Files Linked to Colonial Pipeline. This is a post from HackRead.com Read the original post: Colonial Pipeline Denies Breach by RANSOMEDVC Ransomware Group
Ransomware Data Breach ★★
DarkReading.webp 2023-10-13 20:25:58 Feds: Méfiez-vous des attaques du ransomware Avoslocker contre l'infrastructure critique
Feds: Beware AvosLocker Ransomware Attacks on Critical Infrastructure
(lien direct)
La CISA et le FBI avertissent que les affiliés du fournisseur RAAS frappaient des industries critiques, avec plus d'attaques qui devraient provenir de groupes de ransomware supplémentaires dans les mois à venir.
CISA and FBI warn the RaaS provider\'s affiliates are striking critical industries, with more attacks expected to come from additional ransomware groups in the months ahead.
Ransomware ★★
Last update at: 2024-06-12 05:07:06
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter