What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2024-02-02 15:53:00 INTERPOL Arrestations 31 dans le fonctionnement mondial, identifie 1 900+ IPS liés à 1 900 ransomwares
INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs
(lien direct)
Une opération collaborative dirigée par Interpol ciblant le phishing, les logiciels malveillants bancaires et les attaques de ransomwares a conduit à l'identification de 1 300 adresses IP suspectes et URL. L'effort & nbsp; les forces de l'ordre, nommé par code et NBSP; Synergie, ont eu lieu entre septembre et novembre 2023 pour tenter de désactiver «la croissance, l'escalade et la professionnalisation de la cybercriminalité transnationale». Impliquant 60 loi
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the "growth, escalation and professionalization of transnational cybercrime." Involving 60 law
Ransomware Malware ★★
News.webp 2024-02-02 13:01:06 La dernière intervention cybercriminale d'Interpol démantèle le ransomware, les serveurs de logiciels malveillants bancaires
Interpol\\'s latest cybercrime intervention dismantles ransomware, banking malware servers
(lien direct)
Efforts Partie des opérations coordonnées internationales effectuées au cours des derniers mois Interpol a arrêté 31 personnes à la suite d'une opération de trois mois pour éradiquer divers types de cybercriminaux.…
Efforts part of internationally coordinated operations carried out in recent months Interpol has arrested 31 people following a three-month operation to stamp out various types of cybercrime.…
Ransomware Malware ★★★
SecurityWeek.webp 2024-02-02 12:18:54 31 personnes arrêtées dans la répression mondiale de la cybercriminalité
31 People Arrested in Global Cybercrime Crackdown
(lien direct)
> Les forces de l'ordre dans 50 pays s'associent pour éliminer les ransomwares, les logiciels malveillants bancaires et les menaces de phishing.
>Law enforcement in 50 countries partner to take down ransomware, banking malware, and phishing threats. 
Ransomware Malware Legislation ★★★
InfoSecurityMag.webp 2024-02-02 10:30:00 Lockbit Reigns Suprême dans le paysage des ransomwares en plein essor
LockBit Reigns Supreme in Soaring Ransomware Landscape
(lien direct)
Le dernier trimestre de 2023 a vu une augmentation de 80% en glissement annuel des réclamations de victime de ransomware, selon Reliaquest
The last quarter of 2023 saw an 80% year-on-year increase in ransomware victim claims, according to ReliaQuest
Ransomware ★★★
bleepingcomputer.webp 2024-02-02 07:56:28 Interpol Operation Synergia élimine 1 300 serveurs utilisés pour la cybercriminalité
Interpol operation Synergia takes down 1,300 servers used for cybercrime
(lien direct)
Une opération internationale d'application de la loi est nommé \\ 'Synergie \' a supprimé plus de 1 300 serveurs de commandement et de contrôle utilisés dans les campagnes de ransomware, de phishing et de logiciels malveillants.[...]
An international law enforcement operation code-named \'Synergia\' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns. [...]
Ransomware Malware ★★★
ProofPoint.webp 2024-02-02 05:00:40 Brisez la chaîne d'attaque: le gambit d'ouverture
Break the Attack Chain: The Opening Gambit
(lien direct)
The threat landscape has always evolved. But the pace of change over the last decade is unlike anything most security professionals have experienced before. Today\'s threats focus much less on our infrastructure and much more on our people.   But that\'s not all. Where once a cyberattack may have been a stand-alone event, these events are now almost always multistage. In fact, most modern threats follow the same playbook: initial compromise, lateral movement and impact.   While this approach has the potential to cause more damage, it also gives security teams more opportunities to spot and halt cyberattacks. By placing protections in key spots along the attack chain, we can thwart and frustrate would-be cybercriminals before their ultimate payoff.   This starts with understanding the opening gambit: How do threat actors attempt to gain access to your king-in this case, your networks and data? And what can be done to keep them at bay?  Understanding the playbook  The chess parallels continue when we look at recent evolutions in the threat landscape, with our defensive tactics provoking an adapted method of attack. We see this in full effect when it comes to multifactor authentication (MFA).  In recent years, security professionals have flocked to MFA to protect accounts and safeguard credentials. In response, threat actors have developed MFA bypass and spoofing methods to get around and weaponize these protections. So much so that MFA bypass can now be considered the norm when it comes to corporate credential phishing attacks. Increasingly, cybercriminals purchase off-the-shelf kits which enable them to use adversary-in-the-middle (AiTM) tactics to digitally eavesdrop and steal credentials.   We have also seen an increase in other human-activated methods, such as telephone-oriented attack delivery (TOAD). This method combines voice and email phishing techniques to trick victims into disclosing sensitive information such as login credentials or financial data.   Whatever the method, the desired outcome at this stage is the same. Cybercriminals seek to get inside your defenses so they can execute the next stage of their attack. That is what makes the opening gambit such a critical time in the lifecycle of a cyber threat.   Modern threat actors are experts at remaining undetected once they are inside our networks. They know how to hide in plain sight, move laterally and escalate privileges. So, if this stage of the attack is a success, organizations have a huge problem. The good news is that the more we understand the tactics that today\'s cybercriminals use, the more we can adapt our defenses to stop them in their tracks before they can inflict significant damage.   Countering the gambit  The best opportunity to stop cybercriminals is before and during the initial compromise. By mastering a counter to the opening gambit, we can keep malicious actors where they belong-outside our perimeter.   It will surprise no one that most threats start in the inbox. So, the more we can do to stop malicious messaging before it reaches our people, the better.   There is no silver bullet in this respect. artificial intelligence (AI)-powered email security is as close as it gets. Proofpoint Email Protection is the only AI and machine learning-powered threat protection that disarms today\'s advanced attacks.  Proofpoint Email Protection uses trillions of data points to detect and block business email compromise (BEC), phishing, ransomware, supply chain threats and plenty more. It also correlates threat intelligence across email, cloud and network data to help you stay ahead of new and evolving threats that target your people.   However, the difficult reality is that nothing is entirely impenetrable. Today\'s security teams must assume some threats will reach the inbox. And your people need to be prepared when they do.   Equipping this vital line of defense requires total visibility into who is being attacked in your organization-and when, where and how. Once you have identified the people who ar Ransomware Threat Cloud ★★★
DarkReading.webp 2024-02-01 21:58:00 La recherche de la délibération révèle que les ransomwares sont de retour en augmentation alors que les cybercriminels \\ 'la motivation se déplace vers l'exfiltration des données
Delinea Research Reveals that Ransomware Is Back on the Rise As Cybercriminals\\' Motivation Shifts to Data Exfiltration
(lien direct)
The threat landscape has always evolved. But the pace of change over the last decade is unlike anything most security professionals have experienced before. Today\'s threats focus much less on our infrastructure and much more on our people.   But that\'s not all. Where once a cyberattack may have been a stand-alone event, these events are now almost always multistage. In fact, most modern threats follow the same playbook: initial compromise, lateral movement and impact.   While this approach has the potential to cause more damage, it also gives security teams more opportunities to spot and halt cyberattacks. By placing protections in key spots along the attack chain, we can thwart and frustrate would-be cybercriminals before their ultimate payoff.   This starts with understanding the opening gambit: How do threat actors attempt to gain access to your king-in this case, your networks and data? And what can be done to keep them at bay?  Understanding the playbook  The chess parallels continue when we look at recent evolutions in the threat landscape, with our defensive tactics provoking an adapted method of attack. We see this in full effect when it comes to multifactor authentication (MFA).  In recent years, security professionals have flocked to MFA to protect accounts and safeguard credentials. In response, threat actors have developed MFA bypass and spoofing methods to get around and weaponize these protections. So much so that MFA bypass can now be considered the norm when it comes to corporate credential phishing attacks. Increasingly, cybercriminals purchase off-the-shelf kits which enable them to use adversary-in-the-middle (AiTM) tactics to digitally eavesdrop and steal credentials.   We have also seen an increase in other human-activated methods, such as telephone-oriented attack delivery (TOAD). This method combines voice and email phishing techniques to trick victims into disclosing sensitive information such as login credentials or financial data.   Whatever the method, the desired outcome at this stage is the same. Cybercriminals seek to get inside your defenses so they can execute the next stage of their attack. That is what makes the opening gambit such a critical time in the lifecycle of a cyber threat.   Modern threat actors are experts at remaining undetected once they are inside our networks. They know how to hide in plain sight, move laterally and escalate privileges. So, if this stage of the attack is a success, organizations have a huge problem. The good news is that the more we understand the tactics that today\'s cybercriminals use, the more we can adapt our defenses to stop them in their tracks before they can inflict significant damage.   Countering the gambit  The best opportunity to stop cybercriminals is before and during the initial compromise. By mastering a counter to the opening gambit, we can keep malicious actors where they belong-outside our perimeter.   It will surprise no one that most threats start in the inbox. So, the more we can do to stop malicious messaging before it reaches our people, the better.   There is no silver bullet in this respect. artificial intelligence (AI)-powered email security is as close as it gets. Proofpoint Email Protection is the only AI and machine learning-powered threat protection that disarms today\'s advanced attacks.  Proofpoint Email Protection uses trillions of data points to detect and block business email compromise (BEC), phishing, ransomware, supply chain threats and plenty more. It also correlates threat intelligence across email, cloud and network data to help you stay ahead of new and evolving threats that target your people.   However, the difficult reality is that nothing is entirely impenetrable. Today\'s security teams must assume some threats will reach the inbox. And your people need to be prepared when they do.   Equipping this vital line of defense requires total visibility into who is being attacked in your organization-and when, where and how. Once you have identified the people who ar Ransomware ★★★
RiskIQ.webp 2024-02-01 21:40:33 Trigona Ransomware Threat Actor Uses Mimic Ransomware (lien direct) #### Description AhnLab Security Intelligence Center (ASEC) has identified a new activity of the Trigona ransomware threat actor installing Mimic ransomware. The attack targets MS-SQL servers and exploits the Bulk Copy Program (BCP) utility in MS-SQL servers during the malware installation process. The attacker also attempted to use malware for port forwarding to establish an RDP connection to the infected system and control it remotely. The Trigona threat actor is known to use Mimikatz to steal account credentials. The threat actor installed AnyDesk to control the infected system. Administrators must use passwords that cannot be easily guessed and change them periodically to protect the database servers from brute force and dictionary attacks. V3 must also be updated to the latest version to block malware infection in advance. Administrators should also use security programs such as firewalls for database servers accessible from outside to restrict access by external threat actors. #### Reference URL(s) 1. https://asec.ahnlab.com/en/61000/ #### Publication Date January 29, 2024 #### Author(s) Sanseo
#### Description AhnLab Security Intelligence Center (ASEC) has identified a new activity of the Trigona ransomware threat actor installing Mimic ransomware. The attack targets MS-SQL servers and exploits the Bulk Copy Program (BCP) utility in MS-SQL servers during the malware installation process. The attacker also attempted to use malware for port forwarding to establish an RDP connection to the infected system and control it remotely. The Trigona threat actor is known to use Mimikatz to steal account credentials. The threat actor installed AnyDesk to control the infected system. Administrators must use passwords that cannot be easily guessed and change them periodically to protect the database servers from brute force and dictionary attacks. V3 must also be updated to the latest version to block malware infection in advance. Administrators should also use security programs such as firewalls for database servers accessible from outside to restrict access by external threat actors. #### Reference URL(s) 1. https://asec.ahnlab.com/en/61000/ #### Publication Date January 29, 2024 #### Author(s) Sanseo
Ransomware Malware Threat ★★★
bleepingcomputer.webp 2024-02-01 17:23:56 La FTC ordonne à Blackbaud pour augmenter la sécurité après une violation de données massive
FTC orders Blackbaud to boost security after massive data breach
(lien direct)
Blackbaud s'est installé avec la Federal Trade Commission après avoir été accusé de mauvaise sécurité et de pratiques imprudentes de conservation des données, ce qui a conduit à une attaque de ransomware de mai 2020 et à une violation de données affectant des millions de personnes.[...]
Blackbaud has settled with the Federal Trade Commission after being charged with poor security and reckless data retention practices, leading to a May 2020 ransomware attack and a data breach affecting millions of people. [...]
Ransomware Data Breach ★★
InfoSecurityMag.webp 2024-02-01 16:45:00 Les agences américaines ne supervisent pas les protections des ransomwares menacent les objectifs de la Maison Blanche
US Agencies Failure to Oversee Ransomware Protections Threaten White House Goals
(lien direct)
Un rapport du GAO a révélé que les agences fédérales n'évaluent pas si les secteurs d'infrastructure critiques mettent en œuvre
A GAO report found that federal agencies are not assessing whether critical infrastructure sectors are implementing NIST ransomware protection guidance
Ransomware ★★
InfoSecurityMag.webp 2024-02-01 16:00:00 L'initiative dirigée par Interpol cible 1300 IPS suspects
Interpol-Led Initiative Targets 1300 Suspicious IPs
(lien direct)
L'effort de collaboration mondiale s'est concentré sur la lutte contre la montée mondiale du phishing, des logiciels malveillants et des ransomwares
Global collaborative effort focused on combating the global rise of phishing, malware and ransomware
Ransomware Malware ★★★
News.webp 2024-02-01 14:25:38 Lockbit ne montre aucun remords pour l'attaque des ransomwares contre l'hôpital des enfants \\
LockBit shows no remorse for ransomware attack on children\\'s hospital
(lien direct)
Il a même eu le culot pour fixer la demande de rançon à 800 000 $… pour un gang à but non lucratif ransomware Gang Lockbit revendique une attaque contre l'hôpital de Chicago Children \\ dans une déviation apparente par rapport àsa politique précédente de ne pas cibler les organisations à but non lucratif…
It even had the gall to set the ransom demand at $800K … for a nonprofit Ransomware gang LockBit is claiming responsibility for an attack on a Chicago children\'s hospital in an apparent deviation from its previous policy of not targeting nonprofits.…
Ransomware ★★★
globalsecuritymag.webp 2024-02-01 13:44:53 Tendances des ransomwares et cyber-extorsion dans l'équipe de recherche sur les menaces de rediaquest du quatrième trimestre
Ransomware and Cyber-extortion Trends in Q4 2023 ReliaQuest Threat Research Team
(lien direct)
Ransomware et Tendances de cyber-axtotion dans le quatrième trimestre 2023 Équipe de recherche sur les menaces de Reliaquest - mise à jour malveillant
Ransomware and Cyber-extortion Trends in Q4 2023 ReliaQuest Threat Research Team - Malware Update
Ransomware Threat ★★★
SecurityWeek.webp 2024-02-01 11:39:15 Johnson contrôle l'attaque des ransomwares: le vol de données confirmé, le coût dépasse 27 millions de dollars
Johnson Controls Ransomware Attack: Data Theft Confirmed, Cost Exceeds $27 Million
(lien direct)
> Johnson Controls confirme que la récente attaque de ransomware a entraîné un vol de données et dit que les dépenses ont atteint 27 millions de dollars.
>Johnson Controls confirms that the recent ransomware attack resulted in data theft and says expenses reached $27 million. 
Ransomware ★★★
ProofPoint.webp 2024-02-01 06:00:12 Le pare-feu humain: Pourquoi la formation de sensibilisation à la sécurité est une couche de défense efficace
The Human Firewall: Why Security Awareness Training Is an Effective Layer of Defense
(lien direct)
Do security awareness programs lead to a quantifiable reduction in risk? Do they directly impact a company\'s security culture? In short, are these programs effective? The answer to these questions is a resounding yes! With 74% of all data breaches involving the human element, the importance of educating people to help prevent a breach cannot be understated.   However, for training to be effective, it needs to be frequent, ongoing and provided to everyone. Users should learn about:  How to identify and protect themselves from evolving cyberthreats  What best practices they can use to keep data safe  Why following security policies is important  In this blog post, we discuss the various ways that security awareness training can have a positive impact on your company. We also discuss how to make your program better and how to measure your success.   Security awareness training effectiveness  Let\'s look at three ways that security awareness training can help you boost your defenses.  1. Mitigate your risks   By teaching your team how to spot and handle threats, you can cut down on data breaches and security incidents. Our study on the effects of using Proofpoint Security Awareness showed that many companies saw up to a 40% decrease in the number of harmful links clicked by users.  Think about this: every click on a malicious link could lead to credential theft, a ransomware infection, or the exploitation of a zero-day vulnerability. So, an effective security awareness program essentially reduces security incidents by a similar amount. Want more evidence about how important it is? Just check out this study that shows security risks can be reduced by as much as 80%.   Here is more food for thought. If a malicious link does not directly result in a breach, it must still be investigated. The average time to identify a breach is 204 days. So, if you can reduce the number of incidents you need to investigate, you can see real savings in time and resources.  2. Comply with regulations   Security awareness education helps your company comply with data regulations, which are always changing. This can help you avoid hefty fines and damage to your reputation. In many cases, having a security awareness program can keep you compliant with several regulations. This includes U.S. state privacy laws, the European Union\'s GDPR and other industry regulations.  3. Cultivate a strong security culture  An effective security awareness program doesn\'t have to be all doom and gloom. Done right, it can help you foster a positive security culture. More than half of users (56%) believe that being recognized or rewarded would make their company\'s security awareness efforts more effective. But only 8% of users say that their company provides them with incentives to practice “good” cybersecurity behavior.  When you make security fun through games, contests, and reward and recognition programs, you can keep your employees engaged. You can also motivate them to feel personally responsible for security. That, in turn, can inspire them to be proactive about keeping your critical assets safe.  Finally, be sure to incorporate security principles into your company\'s core values. For example, your business leaders should regularly discuss the importance of security. That will help users to understand that everyone plays a vital role in keeping the business safe.   How to make your security awareness program effective  The verdict is clear. Security awareness programs can tangibly reduce organizational risks. When asked about the connection between their security awareness efforts and their company\'s cybersecurity resilience, a resounding 96% of security professionals say that there is more than just a strong link. They say that it\'s either a direct result of security training or that training is a strong contributor.   Let\'s discuss how you can make your program more effective.   Assess your security posture  The first step toward effectiveness is to assess your company\'s security posture Ransomware Tool Vulnerability Threat Studies ★★★
DarkReading.webp 2024-01-31 23:32:00 Kasperskys ics Cert
Kasperskys ICS CERT Predictions for 2024: Ransomware Rampage, Cosmopolitical Hacktivism, and Beyond
(lien direct)
Do security awareness programs lead to a quantifiable reduction in risk? Do they directly impact a company\'s security culture? In short, are these programs effective? The answer to these questions is a resounding yes! With 74% of all data breaches involving the human element, the importance of educating people to help prevent a breach cannot be understated.   However, for training to be effective, it needs to be frequent, ongoing and provided to everyone. Users should learn about:  How to identify and protect themselves from evolving cyberthreats  What best practices they can use to keep data safe  Why following security policies is important  In this blog post, we discuss the various ways that security awareness training can have a positive impact on your company. We also discuss how to make your program better and how to measure your success.   Security awareness training effectiveness  Let\'s look at three ways that security awareness training can help you boost your defenses.  1. Mitigate your risks   By teaching your team how to spot and handle threats, you can cut down on data breaches and security incidents. Our study on the effects of using Proofpoint Security Awareness showed that many companies saw up to a 40% decrease in the number of harmful links clicked by users.  Think about this: every click on a malicious link could lead to credential theft, a ransomware infection, or the exploitation of a zero-day vulnerability. So, an effective security awareness program essentially reduces security incidents by a similar amount. Want more evidence about how important it is? Just check out this study that shows security risks can be reduced by as much as 80%.   Here is more food for thought. If a malicious link does not directly result in a breach, it must still be investigated. The average time to identify a breach is 204 days. So, if you can reduce the number of incidents you need to investigate, you can see real savings in time and resources.  2. Comply with regulations   Security awareness education helps your company comply with data regulations, which are always changing. This can help you avoid hefty fines and damage to your reputation. In many cases, having a security awareness program can keep you compliant with several regulations. This includes U.S. state privacy laws, the European Union\'s GDPR and other industry regulations.  3. Cultivate a strong security culture  An effective security awareness program doesn\'t have to be all doom and gloom. Done right, it can help you foster a positive security culture. More than half of users (56%) believe that being recognized or rewarded would make their company\'s security awareness efforts more effective. But only 8% of users say that their company provides them with incentives to practice “good” cybersecurity behavior.  When you make security fun through games, contests, and reward and recognition programs, you can keep your employees engaged. You can also motivate them to feel personally responsible for security. That, in turn, can inspire them to be proactive about keeping your critical assets safe.  Finally, be sure to incorporate security principles into your company\'s core values. For example, your business leaders should regularly discuss the importance of security. That will help users to understand that everyone plays a vital role in keeping the business safe.   How to make your security awareness program effective  The verdict is clear. Security awareness programs can tangibly reduce organizational risks. When asked about the connection between their security awareness efforts and their company\'s cybersecurity resilience, a resounding 96% of security professionals say that there is more than just a strong link. They say that it\'s either a direct result of security training or that training is a strong contributor.   Let\'s discuss how you can make your program more effective.   Assess your security posture  The first step toward effectiveness is to assess your company\'s security posture Ransomware Studies Industrial ★★★★
CS.webp 2024-01-31 23:05:07 Pentagone enquêtant sur le vol de fichiers sensibles par un groupe de ransomwares
Pentagon investigating theft of sensitive files by ransomware group
(lien direct)
> Le groupe Ransomware AlphV menace de divulguer des données obtenues auprès d'une société de services informatiques de Virginie qui contracte avec l'armée américaine.
>The ransomware group ALPHV is threatening to leak data obtained from a Virginia IT services company that contracts with the U.S. military.
Ransomware ★★★
DarkReading.webp 2024-01-31 22:49:00 Les groupes de ransomwares gagnent un poids avec de fausses affirmations d'attaque
Ransomware Groups Gain Clout With False Attack Claims
(lien direct)
Technica?Europcar?Les cybercriminels bluffent de plus en plus des attaques de ransomwares, et la communauté de la cybersécurité aide en diffusant leurs mensonges.
Technica? Europcar? Cybercriminals are increasingly bluffing about ransomware attacks, and the cybersecurity community is helping by spreading their lies.
Ransomware ★★★
DarkReading.webp 2024-01-31 21:45:00 Johnson contrôle les coûts de nettoyage des ransomwares supérieurs à 27 millions de dollars et à compter
Johnson Controls Ransomware Cleanup Costs Top $27M and Counting
(lien direct)
Le dernier dépôt de la SEC de JCI \\ note que ses installations de factorie intelligente n'étaient pas compromises, apaisant les craintes de sécurité physique.
JCI\'s latest SEC filing notes that its smart-factory installations weren\'t compromised, allaying physical security fears.
Ransomware ★★★★
knowbe4.webp 2024-01-31 18:52:23 Les paiements de ransomware sur le déclin alors que les cyberattaquants se concentrent sur les organisations les plus petites et les plus grandes
Ransomware Payments On The Decline As Cyber Attackers Focus on The Smallest, And Largest, Organizations
(lien direct)
Ransomware Threat ★★★
RecordedFuture.webp 2024-01-31 14:21:50 Cyberattack de décembre sur l'hôpital communautaire de Chicago revendiqué par Lockbit Gang
December cyberattack on Chicago community hospital claimed by LockBit gang
(lien direct)
Une cyberattaque récemment annoncée dans un grand hôpital communautaire de Chicago a été revendiquée par le gang de ransomware de Lockbit.Saint Anthony Hospital on the City \'s West Side Lundi et a déclaré que l'attaque avait été découverte pour la première fois le 18 décembre. Mardi soir, le gang de ransomware de Lockbit a publié l'hôpital à
A recently announced cyberattack on a large community hospital in Chicago was claimed by the LockBit ransomware gang. Saint Anthony Hospital on the city\'s west side acknowledged the incident in a statement on Monday and said the attack was first discovered on December 18. On Tuesday evening, the LockBit ransomware gang posted the hospital to
Ransomware ★★
Blog.webp 2024-01-31 12:26:08 Le géant de l'énergie électrique Schneider confirme l'attaque du ransomware de cactus
Schneider Electric Energy Giant Confirms Cactus Ransomware Attack
(lien direct)
> Par waqas Schneider Electric Hit by Ransomware Attack: Sustainability Business Division affecté. Ceci est un article de HackRead.com Lire le post original: schneider electricLe géant de l'énergie confirme l'attaque des ransomwares du cactus
>By Waqas Schneider Electric Hit by Ransomware Attack: Sustainability Business Division Impacted. This is a post from HackRead.com Read the original post: Schneider Electric Energy Giant Confirms Cactus Ransomware Attack
Ransomware ★★★
globalsecuritymag.webp 2024-01-31 12:11:38 Veeam lance programme Cyber Secure (lien direct) Veeam lance programme Cyber Secure, pour aider les entreprises à se protéger et rétablir leur activité en cas d'attaque de ransomware Ce programme complet de cyberprotection et de support inclut une assistance technique avant, pendant et après un cyberincident, ainsi que le versement de 5 millions de dollars aux clients de Veeam en cas d'attaque par ransomware. - Business Ransomware ★★
ESET.webp 2024-01-31 10:30:00 ESET Research Podcast: Chatgpt, The Moveit Hack et Pandora
ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora
(lien direct)
Un chatbot AI Kindle par inadvertance un boom de la cybercriminalité, des bandits de ransomware pluncent des organisations sans déploiement
An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes
Ransomware Hack Mobile ChatGPT ★★★
SecureList.webp 2024-01-31 10:00:45 ICS et prédictions de menace OT pour 2024
ICS and OT threat predictions for 2024
(lien direct)
Les experts de Kaspersky font leurs prédictions sur les CI et les menaces OT: en particulier, les ransomwares et les attaques hacktivistes, les menaces pour la logistique et le transport, etc.
Kaspersky experts make their predictions about ICS and OT threats: specifically, ransomware and hacktivist attacks, threats to logistics and transportation, etc.
Ransomware Threat Industrial Prediction ★★★★
bleepingcomputer.webp 2024-01-31 09:55:37 Johnson Controls dit que l'attaque des ransomwares a coûté 27 millions de dollars, les données volées
Johnson Controls says ransomware attack cost $27 million, data stolen
(lien direct)
Johnson Controls International a confirmé qu'une attaque de ransomware de septembre 2023 a coûté 27 millions de dollars à la société et a conduit à une violation de données après que les pirates ont volé des données d'entreprise.[...]
Johnson Controls International has confirmed that a September 2023 ransomware attack cost the company $27 million in expenses and led to a data breach after hackers stole corporate data. [...]
Ransomware Data Breach ★★★
IndustrialCyber.webp 2024-01-31 07:39:04 Schneider Electric fait face à des attaques de ransomwares dans le secteur de la durabilité;Groupe de cactus impliqué
Schneider Electric faces ransomware attack in Sustainability Business; Cactus group involved
(lien direct)
> La société de gestion de l'énergie et d'automatisation industrielle Schneider Electric a confirmé un incident de ransomware dans sa division des affaires de durabilité ....
>Energy management and industrial automation firm Schneider Electric has confirmed a ransomware incident in its Sustainability Business division....
Ransomware Industrial ★★★
Checkpoint.webp 2024-01-31 03:00:56 Le logiciel de point de contrôle dévoile la plate-forme Infinity: pionnier de l'avenir de la cybersécurité alimentée par Cloud, alimentée par l'IA,
Check Point Software Unveils the Infinity Platform: Pioneering the Future of AI-Powered, Cloud-Delivered Cyber Security
(lien direct)
> Chez Check Point Software Technologies, nous sommes toujours à la pointe des solutions innovantes de cybersécurité.Aujourd'hui, nous sommes ravis d'annoncer une évolution importante de la technologie de cybersécurité & # 8211;Le lancement de notre plate-forme Redéfinie à Point Infinity.Cette plate-forme avancée marque une nouvelle ère dans la cybersécurité alimentée par les nuages alimentée par l'IA, spécialement conçue pour relever les défis modernes d'un paysage de menace en évolution.En 2023, le cyber-monde a connu une augmentation stupéfiante de 90% des attaques de ransomwares, mettant en évidence le besoin urgent de mesures de sécurité plus robustes et adaptatives.De plus, le domaine de la cybersécurité fait face à un écart de talent important, avec approximativement [& # 8230;]
>At Check Point Software Technologies, we are always at the forefront of innovative cyber security solutions. Today, we are excited to announce a significant evolution in cyber security technology – the launch of our redefined Check Point Infinity Platform. This advanced platform marks a new era in AI-powered, cloud-delivered cyber security, specifically designed to meet the modern challenges of an evolving threat landscape. In 2023, the cyber world witnessed a staggering 90% increase in ransomware attacks, highlighting the urgent need for more robust and adaptive security measures. Additionally, the cyber security field is facing a significant talent gap, with approximately […]
Ransomware Threat ★★
DarkReading.webp 2024-01-30 22:34:00 \\ 'cactus \\' Ransomware frappe Schneider Electric
\\'Cactus\\' Ransomware Strikes Schneider Electric
(lien direct)
La division du développement durable de Schneider, qui fournit des services de logiciels et de conseil aux entreprises, a été abattu par des cybercriminels à la mi-janvier.
Schneider\'s Sustainability division, which provides software and consulting services to enterprises, was felled by cybercriminals in mid-January.
Ransomware ★★
CS.webp 2024-01-30 21:03:44 GAO: Les agences fédérales manquent de compréhension des protections des ransomwares pour l'infrastructure critique
GAO: Federal agencies lack insight on ransomware protections for critical infrastructure
(lien direct)
> Le gouvernement du gouvernement de la responsabilité constate que les agences supervisant les secteurs clés des infrastructures critiques ne savent pas si des protections contre les ransomwares ont été implémentées.
>The Government Accountability Office finds that agencies overseeing key critical infrastructure sectors don\'t know whether protections against ransomware have been implemented.
Ransomware ★★★
InfoSecurityMag.webp 2024-01-30 17:45:00 Schneider Electric confirme les données accessibles dans Ransomware Attack
Schneider Electric Confirms Data Accessed in Ransomware Attack
(lien direct)
La société d'énergie, Schneider Electric, a déclaré qu'un incident de ransomware, qui aurait été perpétré par le groupe Cactus, a conduit les données accessibles à sa division des activités de durabilité
Energy firm Schneider Electric said a ransomware incident, reportedly perpetrated by the Cactus group, has led to data being accessed from its Sustainability Business division
Ransomware
RecordedFuture.webp 2024-01-30 17:39:33 Schneider Electric confirme l'attaque des ransomwares contre la division de la durabilité
Schneider Electric confirms ransomware attack on sustainability division
(lien direct)
La multinationale française Schneider Electric a déclaré que sa division commerciale de durabilité avait souffert d'une attaque de ransomware au début du mois.La société a confirmé l'incident dans un communiqué cette semaine que l'attaque a affecté son produit de conseil en ressources - un outil de visualisation des données pour les informations sur la durabilité - ainsi que d'autres «systèmes spécifiques à la division».Schneider Electric a dit qu'ils
French multinational Schneider Electric said its Sustainability Business division suffered from a ransomware attack earlier this month. The company confirmed the incident in a statement this week that the attack affected its Resource Advisory product - a data visualization tool for sustainability information - as well as other “division specific systems.” Schneider Electric said they
Ransomware Tool ★★
InfoSecurityMag.webp 2024-01-30 16:30:00 Alpha Ransomware Group lance le site de fuite de données sur le Web Dark
Alpha Ransomware Group Launches Data Leak Site on the Dark Web
(lien direct)
Netenrich a analysé le modèle de note de rançon disant que le groupe affine ses messages aux victimes
Netenrich analyzed the ransom note pattern saying the group is refining their messages to victims
Ransomware ★★
DarkReading.webp 2024-01-30 15:18:00 Cyber Chief du gouvernement des EAU: Nous sommes confrontés quotidiennement à 50 000 cyberattaques
UAE Government Cyber Chief: We Face 50K Cyberattacks Daily
(lien direct)
Les Emirats voient des e-mails de phishing, des attaques DDOS et des ransomwares, ainsi que des analyses de port, régulièrement.
The Emirates see phishing emails, DDoS attacks, and ransomware, as well as port scans, regularly.
Ransomware ★★
InfoSecurityMag.webp 2024-01-30 14:00:00 Les incidents de ransomware atteignent un record, mais les démontages des forces de l'ordre
Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth
(lien direct)
De nouvelles données de Corvus ont révélé que les incidents de ransomware ont augmenté de 68% en 2023 par rapport à 2022, mais les démontages des forces de l'ordre ont entraîné une baisse du quatrième trimestre
New data from Corvus found that ransomware incidents rose by 68% in 2023 compared to 2022, but law enforcement takedowns led to a fall in Q4
Ransomware Legislation ★★★
globalsecuritymag.webp 2024-01-30 13:47:04 (Déjà vu) La recherche de la délibération révèle que les ransomwares sont de retour en augmentation alors que les cybercriminels \\ 'la motivation se déplace vers l'exfiltration des données
Delinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals\\' Motivation Shifts to Data Exfiltration
(lien direct)
La recherche sur la conduite révèle que les ransomwares sont de retour en augmentation alors que les cybercriminels \\ 'se déplacent vers l'exfiltration des données Plus de 75% des organisations paient des ransomwares à mesure que les entreprises de taille moyenne deviennent la cible préférée, le cloud devient le vecteur d'attaque le plus vulnérable - mise à jour malveillant
Delinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals\' Motivation Shifts to Data Exfiltration More than 75% of organizations are paying ransomware as mid-sized companies become the preferred target, cloud becomes the most vulnerable attack vector - Malware Update
Ransomware Studies Cloud
globalsecuritymag.webp 2024-01-30 13:45:17 L\'étude Delinea révèle que les ransomwares sont de nouveau en hausse alors que les cybercriminels se tournent vers l\'exfiltration de données (lien direct) L'étude Delinea révèle que les ransomwares sont de nouveau en hausse alors que les cybercriminels se tournent vers l'exfiltration de données • Plus de 75 % des entreprises paient des ransomwares • Les entreprises de taille moyenne deviennent la cible privilégiée • L'informatique dématérialisée est le vecteur d'attaque le plus vulnérable - Malwares Ransomware Studies ★★★
SecurityWeek.webp 2024-01-30 12:14:41 Division électrique de Schneider répondant à l'attaque des ransomwares, violation de données
Schneider Electric Division Responding to Ransomware Attack, Data Breach
(lien direct)
> La division commerciale de durabilité de Schneider Electric \\ a perturbé à la suite d'une attaque de ransomware et d'une violation de données.
>Schneider Electric\'s Sustainability Business division disrupted as a result of a ransomware attack and data breach. 
Ransomware Data Breach Industrial ★★★★
silicon.fr.webp 2024-01-30 10:17:31 Ransomware chez Schneider Electric : un suspect nommé Cactus (lien direct) Dit victime d'un ransomware, Schneider Electric l'a confirmé. Sans confirmer si on doit bien l'attaque au groupe Cactus. Ransomware Industrial ★★★
IndustrialCyber.webp 2024-01-30 09:13:41 Le rapport UK NCSC met en garde contre l'augmentation de la menace des ransomwares avec la montée de l'IA affectant les cyber opérations
UK NCSC report warns of increased ransomware threat with rise of AI affecting cyber operations
(lien direct)
> Le Royaume-Uni National Cyber Security Center (NCSC) a publié un rapport mettant en évidence l'impact potentiel de l'intelligence artificielle ...
>The U.K. National Cyber Security Centre (NCSC) has released a report highlighting the potential impact of artificial intelligence...
Ransomware Threat ★★★
Blog.webp 2024-01-30 05:20:34 Trigona Ransomware menace l'acteur utilise Mimic Ransomware
Trigona Ransomware Threat Actor Uses Mimic Ransomware
(lien direct)
Ahnlab Security Intelligence Center (ASEC) a récemment identifié une nouvelle activité de l'acteur de menace de ransomware Trigona Installation de Mimicransomware.Comme les cas passés, l'attaque récemment détectée cible les serveurs MS-SQL et est remarquable pour abuser de l'utilitaire BCP (Bulk Copy Program) dans les serveurs MS-SQL pendant le processus d'installation de logiciels malveillants.L'ASEC a découvert un cas d'attaque pour la première fois en utilisant BCP pour installer Mimic début janvier 2024. À la mi-janvier 2024, des types d'attaques similaires étaient identifiés où Trigona a été installé à la place ...
AhnLab SEcurity intelligence Center (ASEC) has recently identified a new activity of the Trigona ransomware threat actor installing Mimic ransomware. Like past cases, the recently detected attack targets MS-SQL servers and is notable for abusing the Bulk Copy Program (BCP) utility in MS-SQL servers during the malware installation process. ASEC first discovered a case of attack using BCP to install Mimic in early January 2024. In mid-January 2024, there were similar types of attacks identified where Trigona was installed instead...
Ransomware Malware Threat ★★
Checkpoint.webp 2024-01-30 04:00:02 Félicitations à Check Point \\'s CPX APAC Partner Award Gainters
Congratulating Check Point\\'s CPX APAC Partner Award Winners
(lien direct)
> 2023 a été l'année des attaques de méga ransomwares et des cybermenaces alimentées par l'IA.La région de l'APAC a été la plus touchée par les cyberattaques, les organisations subissant une moyenne de 1 930 attaques par semaine.Nos partenaires étaient là pour soutenir et guider les clients au milieu du paysage des menaces croissantes et de nouvelles cyber-réglementations.Nous remercions tous nos partenaires pour leur dévouement continu à assurer la meilleure sécurité aux organisations de toutes tailles dans l'APAC.Cette année, nous sommes fiers d'annoncer les prix de partenaire CPX APAC suivants et de célébrer les gagnants: le prix du partenaire de l'année 2023 va à NCS Pte Ltd!Le [& # 8230;]
>2023 was the year of mega ransomware attacks and AI-fueled cyber threats. The APAC region was hit hardest by cyber attacks, with organizations experiencing an average of 1,930 attacks per week. Our partners were there to support and guide customers amidst the growing threat landscape and new cyber regulations. We thank all of our partners for their continued dedication to providing the best security to organizations of all sizes in APAC. This year, we\'re proud to announce the following CPX APAC Partner awards and celebrate the winners: The 2023 Partner of the Year award goes to NCS Pte Ltd! The […]
Ransomware Threat ★★★
globalsecuritymag.webp 2024-01-30 00:30:00 Dévasser des ransomwares alpha: une plongée profonde dans ses opérations
Unveiling Alpha Ransomware: A Deep Dive into Its Operations
(lien direct)
Dévoilage des ransomwares alpha: une plongée profonde dans ses opérations - mise à jour malveillant
Unveiling Alpha Ransomware: A Deep Dive into Its Operations - Malware Update
Ransomware ★★
DarkReading.webp 2024-01-29 18:00:00 Une perspective de cyber-assureur \\ sur la façon d'éviter les ransomwares
A Cyber Insurer\\'s Perspective on How to Avoid Ransomware
(lien direct)
Les compagnies d'assurance ont une vision unique des ravages des ransomwares, ce qui nous permet de formuler des leçons sur la façon d'éviter de devenir victime.
Insurance companies have a unique view of the ravages of ransomware, which lets us formulate lessons in how to avoid becoming a victim.
Ransomware ★★
InfoSecurityMag.webp 2024-01-29 17:15:00 La famille des ransomwares Phobos se développe avec une nouvelle variante Faust
Phobos Ransomware Family Expands With New FAUST Variant
(lien direct)
Fortiguard a déclaré que la variante avait été trouvée dans un document de bureau à l'aide d'un script VBA
FortiGuard said the variant was found in an Office document using a VBA script
Ransomware ★★★
The_Hackers_News.webp 2024-01-29 16:33:00 Albabat, Kasseika, Kuiper: de nouveaux gangs de ransomware augmentent avec Rust et Golang
Albabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and Golang
(lien direct)
Les chercheurs en cybersécurité ont détecté dans la nature une autre variante de la famille des ransomwares Phobos appelée & nbsp; Faust. Fortinet Fortiguard Labs, qui a détaillé la dernière itération du ransomware, a déclaré qu'elle était propagée au moyen d'une infection qui offre un document Microsoft Excel (.xlam) contenant un script VBA. "Les attaquants ont utilisé le service Gitea pour stocker plusieurs fichiers
Cybersecurity researchers have detected in the wild yet another variant of the Phobos ransomware family known as Faust. Fortinet FortiGuard Labs, which detailed the latest iteration of the ransomware, said it\'s being propagated by means of an infection that delivers a Microsoft Excel document (.XLAM) containing a VBA script. "The attackers utilized the Gitea service to store several files
Ransomware ★★★
bleepingcomputer.webp 2024-01-29 15:10:00 Géant de l'énergie Schneider Electric Hit par Cactus Ransomware Attack
Energy giant Schneider Electric hit by Cactus ransomware attack
(lien direct)
Le géant de la gestion de l'énergie et de l'automatisation, Schneider Electric, a subi une attaque de ransomware de cactus menant au vol de données d'entreprise, selon des personnes familières avec la question.[...]
Energy management and automation giant Schneider Electric suffered a Cactus ransomware attack leading to the theft of corporate data, according to people familiar with the matter. [...]
Ransomware ★★★
globalsecuritymag.webp 2024-01-29 13:12:14 Sécurité des données : le ransomware reste la principale préoccupation (lien direct) Sécurité des données : le ransomware reste la principale préoccupation Par Daniel de Prezzo, Head of Technology Southern Europe chez Veritas Technologies - Points de Vue Ransomware ★★★
bleepingcomputer.webp 2024-01-29 11:20:10 Les paiements des ransomwares baissent pour enregistrer le bas car les victimes refusent de payer
Ransomware payments drop to record low as victims refuse to pay
(lien direct)
Le nombre de victimes de ransomwares payant des demandes de rançon a chuté à un creux record de 29% au dernier trimestre de 2023, selon la société de négociation de ransomware Coveware.[...]
The number of ransomware victims paying ransom demands has dropped to a record low of 29% in the final quarter of 2023, according to ransomware negotiation firm Coveware. [...]
Ransomware ★★★★
IndustrialCyber.webp 2024-01-29 11:09:47 Kansas Bus Agency Kcata révèle l'attaque des ransomwares, le groupe Medusa demande une rançon de 2 millions de dollars
Kansas bus agency KCATA discloses ransomware attack, Medusa group demands $2 million ransom
(lien direct)
> La Kansas City Area Transportation Authority (KCATA) a révélé une cyber-attaque de rançon qui a eu lieu mardi, janvier ...
>The Kansas City Area Transportation Authority (KCATA) has disclosed a ransom cyber-attack that took place on Tuesday, Jan....
Ransomware ★★★
Last update at: 2024-05-30 17:08:15
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter