Red Snapper, veteran producers of jazz influenced by hip-hop, dub and electronica, will tour England in support of a new live album this Autmun. Live At The Moth Club will be released on vinyl on October 20 through Lo Recordings, coming on the back of their recent studio album Everybody is Somebody . The band – […]
Lockbit ransomware gang hit the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York Pierluigi Paganini September 14, 2023 LockBit ransomware group breached two hospitals, the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York. The Lockbit ransomware group claims to have hacked two major hospitals, the Carthage Area Hospital and […]
An Iranian state-backed APT group carried out a “wave” of cyber-espionage attacks against thousands of global targets over a six-month period, Microsoft has revealed. The group known as Peach Sandstorm (aka APT33, Elfin, and Refined Kitten) used password spraying techniques between February and July 2023. This is a brute-force technique where threat actors try to […]
Cybercrime , Endpoint Security , Fraud Management & Cybercrime Info Stealer Continues to Succeed via Phishing, Exploiting Ancient Flaw in Office Mathew J. Schwartz (euroinfosec) • September 14, 2023 Loki with a fishing net, as depicted on an 18th-century Icelandic manuscript (Image: public domain via Wikimedia) In Norse mythology, Loki is a cowardly […]
Security-Enhanced Linux is a kernel security module created by the National Security Agency to provide a mechanism for access control policies. SELinux includes a set of kernel modifications and user tools to help configure access control policies on Linux. SELinux can cause problems with applications that behave outside the norm. Web servers, like Nginx or […]
Developer platform Retool disclosed it suffered a breach last month that involved vishing attack on an employee and affected 27 cloud customers. In a blog post Wednesday, Retool revealed it was targeted in a spear phishing attack on August 27. A threat actor impersonating an IT staff member conducted SMS-based phishing and a successful vishing […]
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. MVT supports using public indicators of compromise (IOCs) to scan mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT is […]
A ransomware attack on a third-party supplier has compromised the personal details of thousands of officers with Greater Manchester Police (GMP) in North West England. Although neither financial information nor home addresses were exposed in the incident according to GMP, the risk of officers’ personal details being obtained by organized crime groups — including those […]
The volume of cybersecurity vulnerabilities is rising, with close to 30% more vulnerabilities found in 2022 vs. 2018. Costs are also rising, with a data breach in 2023 costing $4.45M on average vs. $3.62M in 2017. In Q2 2023, a total of 1386 victims were claimed by ransomware attacks compared with just 831 in Q1 […]