"Ransomware Payments Hit $1bn All-Time High in 2023"

"Ransomware Payments Hit $1bn All-Time High in 2023"

According to security researchers at Chainalysis, ransomware actors collected over $1bn in extortion money from their victims in 2023, a record high.  The researchers noted that this is a conservative estimate of the financial impact of ransomware last year, as new cryptocurrency addresses are likely to be discovered over time.  The researchers said the figure for 2022 has already been revised up 24% to $567m, for example.

Submitted by Adam Ekwall on

"CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force"

"CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force"

The Cybersecurity and Infrastructure Security Agency (CISA) has announced a renewal of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force, a public-private partnership with various representatives from public and private sector organizations. They are tasked with identifying challenges as well as developing realistic, actionable, and risk-based recommendations and solutions for managing risks faced by the global ICT supply chain.

Submitted by Gregory Rigby on

"Quantum Key Distribution Criticized by European Intelligence Agencies"

"Quantum Key Distribution Criticized by European Intelligence Agencies"

In a recent position paper, intelligence agencies in Germany, France, the Netherlands, and Sweden gave their criticism about Quantum Key Distribution (QKD). This encryption method theoretically ensures the security of communications by preventing anyone from intercepting keys without detection. According to the agencies, there are several inherent flaws, and a practical implementation would be too expensive and limited. This article continues to discuss the intelligence agencies' criticism of QKD.

Submitted by Gregory Rigby on

"Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials"

"Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials"

Threat actors have been using fake Facebook job advertisements to trick potential victims into installing a new Windows-based stealer malware called Ov3r_Stealer. According to Trustwave SpiderLabs, this malware steals credentials and cryptocurrency wallets. It then sends them to a Telegram channel monitored by the threat actors. Ov3r_Stealer can gather IP address-based locations, hardware information, passwords, cookies, credit card information, auto-fills, browser extensions, cryptocurrency wallets, Microsoft Office documents, and more.

Submitted by Gregory Rigby on

"Toothbrushes Are a Cybersecurity Risk, Too: Millions Participate in DDoS Attacks"

"Toothbrushes Are a Cybersecurity Risk, Too: Millions Participate in DDoS Attacks"

Cybercriminals have expanded their botnet capabilities with about 3 million malware-infected smart toothbrushes. According to the Swiss newspaper Aargauer Zeitung, remotely controlled toothbrushes were pulled into a Distributed Denial-of-Service (DDoS) attack to access and disrupt a website belonging to a company in Switzerland. The threat actors behind the attack used flaws in the Java programming language to infect the smart toothbrushes. Then they used a single command to direct their requests to the server of interest.

Submitted by Gregory Rigby on

"Chinese Hackers Infect Dutch Military Network With Malware"

"Chinese Hackers Infect Dutch Military Network With Malware"

According to the Military Intelligence and Security Service (MIVD) of the Netherlands, a Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices.  It was noted that despite backdooring the hacked systems, the damage from the breach was limited due to network segmentation.  The MIVD stated that the effects of the intrusion were limited because the victim network was segmented from the wider MOD networks.  The victim network had fewer than 50 users.

Submitted by Adam Ekwall on

"Microsoft Azure HDInsight Bugs Expose Big Data to Breaches"

"Microsoft Azure HDInsight Bugs Expose Big Data to Breaches"

Microsoft Azure's big-data analytics service, HDInsight, has three high-risk vulnerabilities. Orca Security has released new findings regarding one Denial-of-Service (DoS) vulnerability and two privilege escalation bugs affecting the service. These vulnerabilities invite performance issues, unauthorized administrative access, and all of the associated risks. Attackers could read, write, delete, and conduct any other management operations on an organization's sensitive data.

Submitted by Gregory Rigby on

"Google Says Spyware Vendors Behind Most Zero-Days It Discovers"

"Google Says Spyware Vendors Behind Most Zero-Days It Discovers"

Commercial Spyware Vendors (CSVs) were behind 80 percent of the zero-day vulnerabilities discovered by Google's Threat Analysis Group (TAG) in 2023 and exploited to spy on devices. Google's TAG has been observing the activities of 40 commercial spyware vendors in order to detect exploitation attempts, protect users of its products, and help protect the larger community by reporting key findings to the proper parties. Google discovered that spyware vendors were behind 35 of the 72 known in-the-wild zero-day exploits affecting its products over the last decade.

Submitted by Gregory Rigby on

"Verizon Insider Data Breach Hits Over 63,000 Employees"

"Verizon Insider Data Breach Hits Over 63,000 Employees"

Verizon Communications has recently warned that an insider data breach impacts almost half its workforce, exposing sensitive employee information.  A data breach notification shared with the Office of the Maine Attorney General reveals that a Verizon employee gained unauthorized access to a file containing sensitive employee information on September 21, 2023.  Verizon says it discovered the breach on December 12, 2023, nearly three months later, and determined it contained sensitive information of 63,206 employees.

Submitted by Adam Ekwall on

"AWS, Cisco, Google, NVIDIA and IBM Join With Linux Foundation in Post-Quantum Cryptography Initiative"

"AWS, Cisco, Google, NVIDIA and IBM Join With Linux Foundation in Post-Quantum Cryptography Initiative"

The Linux Foundation has announced the launch of the Post-Quantum Cryptography Alliance (PQCA). This effort brings chip makers, cloud providers, researchers, and developers together to address the cryptographic security challenges raised by quantum computing. The PQCA's founding members include Amazon Web Services (AWS), Cisco, Google, IBM, NVIDIA, QuSecure, the University of Waterloo, and more. The PQCA will participate in different technical projects that support its objectives, including developing software for evaluating, prototyping, and implementing new post-quantum algorithms.

Submitted by Gregory Rigby on
Subscribe to