The attack exploits weaknesses in the SSH transport layer protocol and encryption modes used by a majority of current implementations, making it a significant concern for the cybersecurity community.
Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in software or operating systems. Cybercriminals often target organizations with weak cybersecurity measures, outdated software, or inadequate employee training on recognizing and preventing phishing attacks. In […]
Executive summary In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing a severe threat to both Windows and macOS operating systems. As of the time of publishing of this article, traditional antivirus solutions have low or even non-existent detection rates, making it […]
Dec 20, 2023NewsroomFinancial Crime / Cyber Threat A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and seizures worth $300 million across 34 countries. The exercise, which took place from July through December 2023, took aim at various types of financial crimes such as voice phishing, romance scams, […]
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have become a very hot commodity in the criminal space, so much so that there is competition between various groups. Threat actors have primarily used malspam as an infection vector to drop MetaStealer as well as […]
Dec 20, 2023NewsroomCryptocurrency / Malware A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platform threat to infiltrate both Windows and Apple macOS systems. AT&T Alien Labs, which made the discovery, said the malware is “equipped with an extensive array of commands from its command-and-control (C&C) server.” Artifacts designed for macOS […]
The American identity and access management giant is making its first purchase in Israel. Spera, which raised $10 million in Seed funding earlier this year, has developed a solution to provide end-to-end identity attack surface management, risk reduction and identity threat prevention, detection, and response 15:05, 19.12.23
Healthcare , Industry Specific , Standards, Regulations & Compliance What Should the US Government Do to Impove Medical Cybersecurity? Marianne Kolbasuk McGee (HealthInfoSec) • December 18, 2023 The American Hospital Association opposes a Biden administration proposal for mandatory cybersecurity requirements. (Image: Shutterstock) Lobbyists for U.S. hospitals oppose a Biden administration proposal for mandatory […]
Legacy vulnerabilities and Remote Desktop Protocol (RDP) endpoints are being singled out by attackers, according to new data based on billions of recorded cyber-attacks in 2023. Honeypot sensors set up in the UK by insurer Coalition have recorded 5.8 billion attacks so far in 2023, which works out roughly to 17 million each day. Three-quarters […]