"Change Healthcare Breach Affects 100 Million Americans"

"Change Healthcare Breach Affects 100 Million Americans"

The Change Healthcare ransomware attack affected the personal information of 100 million US citizens, according to updated information from the US Department of Health and Human Services (HHS). Therefore, the attack, which began in February 2024, is the largest known data breach of US healthcare records ever documented. This article continues to discuss the occurrence and impact of the Change Healthcare ransomware attack.

Submitted by Gregory Rigby on

"'Prometei' Botnet Spreads Its Cryptojacker Worldwide"

"'Prometei' Botnet Spreads Its Cryptojacker Worldwide"

The 8-year-old modular botnet "Prometei" is still active, spreading a cryptojacker and web shell on machines. Prometei was discovered in 2020, but later evidence suggested it has been around since 2016. Over the years, it has spread to over 10,000 computers in Brazil, Indonesia, Turkey, Germany, and more. Weak configurations and unpatched systems spread the botnet to cybersecurity-poor regions. This article continues to discuss findings regarding the Prometei botnet.

Submitted by Gregory Rigby on

"New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics"

"New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics"

Researchers at Halcyon have found an advanced variant of the "Qilin" ransomware with more sophisticated and evasive tactics. According to the researchers, the variant tracked as "Qilin.B" now supports AES-256-CTR encryption for systems with AESNI capabilities, while still maintaining Chacha20 for systems lacking this support. This article continues to discuss findings regarding the new Qilin.B ransomware variant.

Submitted by Gregory Rigby on

"White House Issues AI National Security Memo"

"White House Issues AI National Security Memo"

The White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI), outlining important actions that the federal government should take to ensure the safe, secure, and trustworthy development of the technology. Key actions relate to tracking and countering adversary AI development and use. This article continues to discuss the new AI NSM.

Infosecurity Magazine reports "White House Issues AI National Security Memo"

 

Submitted by Gregory Rigby on

"Exploit Released for New Windows Server 'WinReg' NTLM Relay Attack"

"Exploit Released for New Windows Server 'WinReg' NTLM Relay Attack"

Publicly available Proof-of-Concept (PoC) exploit code for a vulnerability in Microsoft's Remote Registry client can be used to take over a Windows domain by downgrading the security of the authentication process. The vulnerability stems from a fallback mechanism in the Windows Registry (WinReg) client implementation that relies on old transport protocols if the Server Message Block (SMB) transport is absent.

Submitted by Gregory Rigby on

"AI and Deepfakes Fuel Phishing Scams, Making Detection Harder"

"AI and Deepfakes Fuel Phishing Scams, Making Detection Harder"

According to Teleport, Artificial Intelligence (AI) impersonation has become the most difficult vector for cybersecurity professionals to protect companies against. Based on the study, which surveyed 250 senior US and UK decision-makers, social engineering remains one of the most common tactics used by cybercriminals to install malware and steal sensitive data, with advances in AI and deepfakes increasing the effectiveness of phishing scams.

Submitted by Gregory Rigby on

"Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models"

"Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models"

Palo Alto Networks' Unit 42 researchers have revealed a new adversarial technique they call "Deceptive Delight" that can jailbreak Large Language Models (LLMs) during an interactive conversation by sneaking in a malicious instruction between harmless ones. The simple yet effective method achieves an average 64.6 percent Attack Success Rate (ASR) in three interaction turns. This article continues to discuss observations regarding the Deceptive Delight multi-turn technique.

Submitted by Gregory Rigby on

"Avast Releases Free Decryptor for Mallox Ransomware"

"Avast Releases Free Decryptor for Mallox Ransomware"

Anti-malware vendor Avast recently published a free decryption tool to help victims to recover from the Mallox ransomware attacks.  Mallox ransomware was fisrt observed in 2021, and is also known as Fargo, TargetCompany, and Tohnichi.  Mallox has been operating under the ransomware-as-a-service (RaaS) business model and is known for targeting Microsoft SQL servers for initial compromise.

Submitted by Adam Ekwall on

"Ransomware Attacks on Healthcare Sector Are Driving Increase in Emergency Patient Care"

"Ransomware Attacks on Healthcare Sector Are Driving Increase in Emergency Patient Care"

According to a new report by Microsoft, ransomware attacks on the healthcare sector are rising and putting lives at risk.  The researchers, during their study, found that there has been a 300% increase in ransomware attacks on the healthcare sector since 2015, and there has been an increase in stroke and cardiac arrest cases at hospitals receiving patients from nearby facilities paralyzed by such attacks. Microsoft noted that healthcare is one of the top 10 most targeted sectors, and the average payment from a survey of healthcare organizations was $4.4 million.

Submitted by Adam Ekwall on

"70% of Leaders See Cyber Knowledge Gap in Employees"

"70% of Leaders See Cyber Knowledge Gap in Employees"

According to a new study by researchers at Fortinet, nearly 70% of business leaders believe their employees lack critical cybersecurity knowledge, a sharp increase from 56% in 2023.  The researchers also found that AI-driven cyberattacks are becoming more difficult for employees to detect.  Over 60% of survey respondents expect a rise in employees falling victim to AI-enhanced attacks. However, 80% of those surveyed said that increased awareness of these AI-augmented threats has prompted organizations to embrace security awareness and training programs.

Submitted by Adam Ekwall on
Subscribe to