The Belgian village of Breendonk — home to Duvel Moortgat Brewery, which was hit by a cyberattack last week — is now facing a second incident affecting local coffee roasters Koffie Beyers. The impact of the incident affecting Beyers is not yet clear. Police have confirmed that an investigation is underway and that specialists from […]
BianLian group exploits JetBrains TeamCity bugs in ransomware attacks Pierluigi Paganini March 11, 2024 BianLian ransomware group was spotted exploiting vulnerabilities in JetBrains TeamCity software in recent attacks. Researchers from GuidePoint Security noticed, while investigating a recent attack linked to the BianLian ransomware group, that the threat actors gained initial access to the target by […]
The developers of the Leather cryptocurrency wallet have issued a warning about a counterfeit app on the Apple App Store. This fake app has led to users reporting that it drains their wallets and steals their digital assets.
California-based cybersecurity startup Reach Security has pulled in $20 million from a Series A funding round, which will be used toward the development of tools that would help organizations navigate cybersecurity solutions and strengthen network visibility, SecurityWeek reports. Reach Security, which seeks to provide insights from threat intelligence, cybersecurity product configurations, and security incidents, has touted having […]
Leicester City Council’s IT systems and phone lines are expected to remain out of service until “at least midweek” following a cyber attack. Systems have been down since Thursday, March 7. The local authority said it was working with “cyber security and law enforcement partners” to try to get them up and running again. It […]
New information made public by the state of California shows that a significant portion of data brokers collect and sell sensitive information on topics like reproductive health, as well as data belonging to children. Out of 480 data brokers registered with the California Privacy Protection Agency (CPPA), 24 indicated they sell data belonging to minors. […]
As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can’t be overstated. With organizations increasingly migrating to cloud environments, the PAM Solution Market is experiencing a transformative shift toward cloud-based offerings. One Identity PAM Essentials stands
Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing PDF attachments. “This intricate attack involves the PDF downloading a ZIP file and subsequently utilizing DLL side-loading techniques to execute the final malware,” Fortinet FortiGuard Labs researcher Cara Lin said. The attack chain involves the […]
An Iranian state-backed hacking group recently infiltrated a company that makes academic administration software and used that access to intimidate other Israeli organizations, analysts said on Thursday. The overall goal of the operation appeared to be hacktivism and not necessarily financial gain, according to OP Innovate, the Israeli company that investigated the incident. In November, […]