"BYU Professors Can Detect Identity Fraud by Tracking Computer Keystrokes"

"BYU Professors Can Detect Identity Fraud by Tracking Computer Keystrokes"

A team of Brigham Young University (BYU) professors have developed a technology that uses hidden JavaScript to detect online identity fraud by measuring the speed and manner with which someone types. The detection system was refined over four observational studies with more than 1,000 participants. It was demonstrated to be 95.5 percent accurate at determining "fraudulent activity" in experimental settings where subjects entered personal information (e.g., names and email addresses) and information belonging to other people on online forms.

Submitted by Gregory Rigby on

"BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign"

"BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign"

Resecurity has discovered a meaningful link between the three major ransomware groups known as BianLian, White Rabbit, and Mario. The groups were found working together in a joint extortion campaign targeting publicly traded financial services companies. Resecurity shared a list of IP addresses associated with the joint attack. Multiple Residential IP Proxies in the APAC region were used in the attack.

Submitted by Gregory Rigby on

"5 Cybersecurity Predictions for 2024"

"5 Cybersecurity Predictions for 2024"

Cybersecurity costs could hit 10.5 trillion by the end of the year. Advanced phishing will employ generative AI to make scamming easier and more convincing to potential victims. Scams powered by AI will spawn other scams like automated customer support scams and spreading fake news and deepfake images and videos. The 2024 election will see a big increase in these types of scams. Supply chain attacks will increase with any link in the chain causing wide spread problems to operations and availability of products and service to customers.

Submitted by Gregory Rigby on

"Supply Chain Attack Targeting Ledger Crypto Wallet Leaves Users Hacked"

"Supply Chain Attack Targeting Ledger Crypto Wallet Leaves Users Hacked"

According to the software maker Ledger, hackers compromised the code behind a cryptocurrency protocol used by multiple Web3 applications and services. Ledger, a company that makes a popular cryptocurrency hardware and software wallet and other products, announced that a "malicious version" of its Ledger Connect Kit had been distributed. Ledger Connect Kit is a library used by decentralized apps (dApps) made by other companies and projects to connect to the Ledger wallet service. This article continues to discuss details regarding the supply chain attack.

Submitted by Gregory Rigby on

"UK Plans Tough New Security Rules For Data Centers"

"UK Plans Tough New Security Rules For Data Centers"

The UK government has recently proposed new rules designed to regulate the data center sector in a bid to improve baseline cybersecurity and resilience.  Under the current proposals, data center providers would have a "duty to take appropriate and proportionate technical and organizational measures" to manage security and resilience risk.

Submitted by Adam Ekwall on

"CISA Releases Key Risk and Vulnerability Findings for Healthcare and Public Health Sector"

"CISA Releases Key Risk and Vulnerability Findings for Healthcare and Public Health Sector"

The Cybersecurity and Infrastructure Security Agency (CISA) has released a Cybersecurity Advisory (CSA) titled "Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment," which details the agency's key findings and activities during a Risk and Vulnerability Assessment (RVA) performed at a Healthcare and Public Health (HPH) organization in early 2023. The advisory also gives network defenders and software vendors suggestions on how to improve their organizations' and customers' cyber posture.

Submitted by Gregory Rigby on

"Seattle Cancer Center Confirms Cyberattack After Ransomware Gang Threats"

"Seattle Cancer Center Confirms Cyberattack After Ransomware Gang Threats"

The Fred Hutchinson Cancer Center in Seattle has been targeted by a cyberattack claimed by the Hunters International ransomware group. The ransomware group claimed to have stolen 533 GB of data from the Fred Hutchinson Cancer Center, listing the organization on its leak site. According to reports, the group was also extorting individual patients. The Fred Hutchinson Cancer Center is a non-profit organization and Washington's only National Cancer Institute-designated cancer center. It has eight clinical care centers that offer a wide range of services and conduct research.

Submitted by Gregory Rigby on

"Four Charged in Connection With $80m Pig Butchering Scheme"

"Four Charged in Connection With $80m Pig Butchering Scheme"

Four US residents have recently been charged with a series of money laundering offenses connected to a major "pig butchering" fraud syndicate.  Lu Zhang, 36, of Alhambra, California; Justin Walker, 31, of Cypress, California; Joseph Wong, 32, of Rosemead, California; and Hailong Zhu, 40, of Naperville, Illinois, are charged with conspiracy to commit money laundering, concealment money laundering, and international money laundering.

Submitted by Adam Ekwall on

"New NKAbuse Malware Abuses NKN Blockchain for Stealthy Comms"

"New NKAbuse Malware Abuses NKN Blockchain for Stealthy Comms"

NKAbuse is the first malware to abuse New Kind of Network (NKN) technology for data exchange, which makes it a stealthy threat. According to researchers, NKAbuse is a Go-based multi-platform malware. NKN is a decentralized peer-to-peer (P2P) network protocol that uses blockchain technology to manage resources as well as maintain a secure and transparent model for network operations. This article continues to discuss findings regarding the NKAbuse malware.

Submitted by Gregory Rigby on

"Israeli Company Hires Overseas Attackers for 'Hack Back' Effort"

"Israeli Company Hires Overseas Attackers for 'Hack Back' Effort"

Doron Amir, CEO of CyTaka, a cybersecurity awareness and training company, hired a network of offensive cyber hackers worldwide to target disinformation distribution and offensive cyber operations that fund terrorist organizations. While Israeli law prohibits private cyber companies from attacking international cyber systems, Amir says he is using attackers from other countries "operating within legal frameworks." Allowing people to engage in offensive cyber operations, along with proper supervision and accountability, according to Amir, would deter cyberattacks.

Submitted by Gregory Rigby on
Subscribe to