"New Gitloker Attacks Wipe GitHub Repos in Extortion Scheme"

"New Gitloker Attacks Wipe GitHub Repos in Extortion Scheme"

Attackers are wiping GitHub repositories' contents and asking victims to contact them on Telegram. CronUp security researcher German Fernandez discovered the malicious campaign. The threat actor behind it, with the Gitloker handle on Telegram, poses as a cyber incident analyst. They are likely using stolen credentials to compromise targets' GitHub accounts. This article continues to discuss the new Gitloker attacks wiping GitHub repositories in an extortion scheme. 

Submitted by Gregory Rigby on

"'Commando Cat' Digs Its Claws Into Exposed Docker Containers"

"'Commando Cat' Digs Its Claws Into Exposed Docker Containers"

In a campaign called "Commando Cat," cybercriminals use misconfigured Docker containers to conduct cryptojacking. The campaign emerged earlier this year. Trend Micro's latest update regarding the campaign shows that unknown attackers are still using Docker misconfigurations to gain unauthorized access to containerized environments. They use Docker images to launch cryptocurrency miners. This article continues to discuss findings regarding the Commando Cat campaign.

Submitted by Gregory Rigby on

"Ransomware Report Finds 43% of Data Unrecoverable After Attack"

"Ransomware Report Finds 43% of Data Unrecoverable After Attack"

Veeam found that ransomware victims permanently lose an average of 43 percent of the data impacted by an attack. The "Veeam Ransomware Trends Report 2024," based on a survey of 1,200 CISOs, security professionals, and backup administrators who experienced a ransomware attack in 2023, discovered that many organizations are unprepared to recover despite most having incident response plans and policies. This article continues to discuss key findings from Veeam regarding ransomware trends.

Submitted by Gregory Rigby on

"26% of Organizations Lack Any Form of IT Security Training"

"26% of Organizations Lack Any Form of IT Security Training"

Hornetsecurity reports that 26 percent of organizations do not train end users on Information Technology (IT) security. The Hornetsecurity survey of industry professionals worldwide found that 8 percent of organizations offer adaptive training based on security tests. Every company's cybersecurity strategy relies on people. Phishing, which exploits trust, is the most common cyberattack. Employees must have the skills, knowledge, and confidence to spot malicious behavior. However, Hornetsecurity's survey found a training gap and ineffective training initiatives.

Submitted by Gregory Rigby on

"Why Hackers Love Logs"

"Why Hackers Love Logs"

Computer log tampering is almost always part of a system compromise. Computer log files record application actions. They help identify system issues like design malfunctions and malicious activity. However, their value is often overlooked. They are usually read/write text files with little security and are not considered the company's "crown jewels" to protect. This is a mistake because the logs contain a record of the Information Technology (IT) infrastructure and its use.

Submitted by Gregory Rigby on

CMMC Ecosystem Summit

"That’s why we created the CEIC conference.  We have carefully designed CEIC so it has something for everyone in the broader CMMC ecosystem!  Whether you are a CMMC novice looking for help getting started, a seasoned pro looking for advanced training, or a service provider who wants a sneak peek into next-generation solutions to help you more efficiently maintain CMMC-compliant environments at scale, CEIC East has something for everyone.  Join us November 21-22 to learn the latest updates on the CMMC program and much more!"

 

 

"SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign"

"SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign"

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a warning about "SPECTR" malware attacks on the country's defense forces. These attacks are part of the "SickSync" espionage campaign. According to the agency, the attacks are connected to a threat actor tracked as "UAC-0020," also known as "Vermin." The threat actor is believed to be associated with security agencies of the Luhansk People's Republic (LPR). This article continues to discuss the targeting of Ukraine's defense forces by the SickSync espionage campaign involving SPECTR malware.

Submitted by Gregory Rigby on

"Google Funds New Cybersecurity Clinics at 15 Colleges"

"Google Funds New Cybersecurity Clinics at 15 Colleges"

Google and the Consortium of Cybersecurity Clinics awarded 15 colleges, universities, and community colleges up to $1 million each to open cybersecurity clinics at campuses. Google will also provide student mentorship opportunities at the selected higher education institutions. The company's cybersecurity clinics fund aims to strengthen members of the Consortium of Cybersecurity Clinics and the cyber workforce. This article continues to discuss Google and the Consortium of Cybersecurity Clinics granting 15 universities and colleges up to $1 million each to create new clinics.

Submitted by Gregory Rigby on

"Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default"

"Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default"

Microsoft has decided to disable its Windows Recall feature on Copilot+ PCs by default. The feature, considered a security and privacy risk, was turned on by default, requiring users to go through checkboxes to opt out of the software. Windows Recall uses Artificial Intelligence (AI) to create a searchable digital memory of everything a user does on their Windows computer. Security researchers found several ways malware could steal Windows Recall data, and Google Project Zero researcher James Forshaw showed that Windows Recall data is poorly protected.

Submitted by Gregory Rigby on

"Security Flaws Found in Popular WooCommerce Plugin"

"Security Flaws Found in Popular WooCommerce Plugin"

Security researchers at Patchstack have discovered multiple security vulnerabilities in the WooCommerce Amazon Affiliates (WZone) plugin.  This premium WordPress plugin, developed by AA-Team and boasting over 35,000 sales, is designed to assist site owners and bloggers in monetizing their websites via the Amazon affiliate program.  The researchers noted that the vulnerabilities identified are serious, impacting all tested versions, including version 14.0.10 and potentially those from version 14.0.20 onward.

Submitted by Adam Ekwall on
Subscribe to