Cybersecurity

Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining

Mar 06, 2024NewsroomServer Security / Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed to deliver a cryptocurrency miner and spawn a reverse shell for persistent remote access. “The attackers leverage these tools to issue exploit code, […]

Cybersecurity

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

Mar 06, 2024NewsroomCyber Crime / Ransomware The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a bogus law enforcement seizure banner. “ALPHV/BlackCat did not get seized. They are exit scamming their affiliates,” security researcher Fabian Wosar said. “It is blatantly obvious when you […]

Cybersecurity

Organizations are knowingly releasing vulnerable applications – Help Net Security

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away from dedicated security teams and is now shared between AppSec managers and developers. 49% of […]

Cybersecurity

CrowdStrike to Buy Israeli Data Defense Vendor Flow Security

Cloud-Native Application Protection Platform (CNAPP) , Data Loss Prevention (DLP) , Endpoint Security Data Security Posture Management Deal Will Help CrowdStrike Guard Endpoints, Clouds Michael Novinson (MichaelNovinson) • March 5, 2024     CrowdStrike plans to purchase a data security posture management startup led by an Israeli Defense Forces team leader to safeguard information across […]

Cybersecurity

Hornetsecurity Buys Vade to Fuel Strength in France, Germany

Email Security & Protection , Fraud Management & Cybercrime , Governance & Risk Management Joint Hornetsecurity-Vade Will Have More Geographic Reach, Microsoft 365 Protection Michael Novinson (MichaelNovinson) • March 5, 2024     Georges Lotigier, CEO, Vade (Image: Vade) Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around […]

Cybersecurity

Hornetsecurity Buys Vade to Fuel Strength in France, Germany

Email Security & Protection , Fraud Management & Cybercrime , Governance & Risk Management Joint Hornetsecurity-Vade Will Have More Geographic Reach, Microsoft 365 Protection Michael Novinson (MichaelNovinson) • March 5, 2024     Georges Lotigier, CEO, Vade (Image: Vade) Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around […]

Cybersecurity

Georgia Tech researchers warn of Stuxnet-style web-based PLC malware, redefining industrial cybersecurity threats – Industrial Cyber

Researchers from the Georgia Institute of Technology presented a novel approach to developing programmable logic controller (PLC) malware that proves to be more flexible, resilient, and impactful than current strategies. The scheme allows the malware to stealthily attack the underlying real-world machinery using the legitimate web application program interfaces (APIs) exposed by the admin portal […]

Cybersecurity

Georgia Tech researchers warn of Stuxnet-style web-based PLC malware, redefining industrial cybersecurity threats – Industrial Cyber

Researchers from the Georgia Institute of Technology presented a novel approach to developing programmable logic controller (PLC) malware that proves to be more flexible, resilient, and impactful than current strategies. The scheme allows the malware to stealthily attack the underlying real-world machinery using the legitimate web application program interfaces (APIs) exposed by the admin portal […]