"New Ransomware-as-a-Service 'Eldorado' Targets Windows and Linux Systems"

"New Ransomware-as-a-Service 'Eldorado' Targets Windows and Linux Systems"

"Eldorado," a new Ransomware-as-a-Service (RaaS), encrypts Windows and Linux files with locker variants. According to Group-IB, Eldorado first appeared on March 16, 2024, when an advertisement for the affiliate program was posted on the ransomware forum RAMP. Researchers said the Eldorado ransomware uses Golang for cross-platform capabilities, Chacha20 for file encryption, and RSA-OAEP for key encryption. This article continues to discuss findings regarding the Eldorado RaaS.

Submitted by Gregory Rigby on

"CISA Releases Guide to Operational Security for Election Officials"

"CISA Releases Guide to Operational Security for Election Officials"

The US Cybersecurity and Infrastructure Security Agency (CISA) has published its "Guide to Operational Security for Election Officials." This guide provides a comprehensive overview of Operational Security (OPSEC) in elections, underlining risks and offering practical mitigation measures to improve election infrastructure security. OPSEC systematically identifies and protects sensitive organizational data, information, and capabilities.

Submitted by Gregory Rigby on

"Crypto Thefts Double to $1.4 Billion, TRM Labs Finds"

"Crypto Thefts Double to $1.4 Billion, TRM Labs Finds"

According to TRM Labs, cryptocurrency exchange hacks and exploits has resulted in the theft of twice as much money in the first half of 2024 as the same period in 2023. A new TRM report found that cryptocurrency exchange hackers stole $1.38 billion between January 1 and June 24, 2024. This article continues to discuss the rise in hacks and exploits on cryptocurrency exchanges.

Infosecurity Magazine reports "Crypto Thefts Double to $1.4 Billion, TRM Labs Finds"

Submitted by Gregory Rigby on

"Hacker Stole Secrets From OpenAI"

"Hacker Stole Secrets From OpenAI"

According to the New York Times (NYT), OpenAI, the ChatGPT maker, had an undisclosed breach in early 2023. The NYT reports that the attacker stole employee forum discussions but did not access systems housing and building the Artificial Intelligence (AI). OpenAI claims that no customer or partner data was stolen, and the breach did not threaten national security, so it did not notify the FBI. This article continues to discuss the theft of secrets from OpenAI in 2023.

Submitted by Gregory Rigby on

"Gamers' Data Exposed in RPG Platform Roll20 Breach"

"Gamers' Data Exposed in RPG Platform Roll20 Breach"

Roll20, a popular online tabletop platform for role-playing games (RPGs), recently revealed that its systems had been breached.  The company said that a threat actor gained unauthorized access to the company’s administrative website on June 29 and could view and access all user accounts, exposing Roll20 users’ personally identifiable information (PII).  The data stolen includes users’ first and last names, email addresses, the last known IP address, and the last four digits of the credit card of users who maintained a stored payment method in their Roll20 account.

Submitted by Adam Ekwall on

"Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers"

"Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers"

Twilio recently confirmed that it had suffered a data breach after hackers leaked 33 million phone numbers associated with the Authy application.  In late June, hacking group ShinyHunters said they were leaking 33 million random phone numbers associated with Twilio’s two-factor authentication app Authy.

Submitted by Adam Ekwall on

"10 Billion Passwords Leaked on Hacking Forum"

"10 Billion Passwords Leaked on Hacking Forum"

According to security researchers at Cybernews, nearly 10 billion unique passwords have been leaked on a cybercrime forum, putting online users worldwide at risk of account compromise.  The researchers say they discovered the leak of 9.94 million plaintext passwords, described as the largest password compilation of all time.  It was posted on a popular hacking forum by a user named "ObamaCare" on July 4.  The researchers noted that this user, who only registered for the forum in late May 2024, has previously shared sensitive information accessed from breaches.

Submitted by Adam Ekwall on

"Over $1bn in Cryptocurrency Lost to Web3 Cyber Incidents in 2024"

"Over $1bn in Cryptocurrency Lost to Web3 Cyber Incidents in 2024"

Security researchers at blockchain monitoring firm Certik recently discovered that more than $1.1bn worth of cryptocurrency has been lost from Web3 cybersecurity incidents in the first half of 2024.  The researchers noted that these losses occurred across 408 on-chain security incidents over the six-month period, making the average cost to victims per incident $2.9m.  The median loss was $230,784, highlighting the wide disparity between the losses suffered during individual attacks.

Submitted by Adam Ekwall on

"New Open-Source Software Is Greater Than the Sum of Its Parts"

"New Open-Source Software Is Greater Than the Sum of Its Parts"

Norbert Lutkenhaus, executive director of the Institute for Quantum Computing (IQC) and professor in the Department of Physics and Astronomy at the University of Waterloo, has been working with his research group to develop accurate software models for Quantum Key Distribution (QKD) research. QKD is a process for cryptography involving the application of quantum mechanics principles to exchange secret keys used to ensure secure communication.

Submitted by Gregory Rigby on

"CAREER Award Recipient Seeks to Secure Web Addresses"

"CAREER Award Recipient Seeks to Secure Web Addresses"

Through a National Science Foundation (NSF) Faculty Early Career Development (CAREER) award, Taejoong "Tijay" Chung, a researcher at Virginia Tech's College of Engineering, is conducting a project aimed at improving the security of today's Domain Name System (DNS) and Internet Protocol (IP) addresses. Chung and his team will work on developing a technique for finding and evaluating security vulnerabilities, analyzing the causes of configuration errors in the IP system, using Machine Learning (ML)-based tools to automatically correct them, and more.

Submitted by Gregory Rigby on
Subscribe to