News
-
"Cybersecurity Firm Sophos Impersonated by New SophosEncrypt Ransomware"The cybersecurity vendor Sophos is being impersonated by a new Ransomware-as-a-Service (RaaS) called SophosEncrypt. MalwareHunterTeam recently discovered the ransomware that was initially believed to be part of a Sophos red team exercise. However, the…
-
"Cybersecurity Measures SMBs Should Implement"According to the 2023 Verizon Data Breach Investigations Report (DBIR), small and medium-sized businesses (SMBs) are targeted by cybercriminals as much as large companies. SMBs are often found to underestimate their appeal as potential targets since they…
-
"Hacker Infected & Foiled by Own Infostealer"The reputation of the malicious actor "La_Citrix" was based on gaining access to Citrix Remote Desktop Protocol (RDP) Virtual Private Network (VPN) servers and selling them to the highest bidder on Russian-language dark web forums. The threat actor was…
-
"Intern Develops Technology to Find EV Charging Vulnerabilities"Jake Guidry, an Idaho National Laboratory (INL) intern, has developed a cybersecurity research tool to improve the security of Electric Vehicle (EV) charging. The AcCCS tool provides access capabilities through the Combined Charging System (CCS)…
-
"DBST: A Lightweight Block Cipher Based on Dynamic S-Box"Block ciphers, a branch of cryptography, are important in information security as 5G technology advances. While encryption algorithms of the traditional Feistel structure have significant advantages regarding consistent encryption and decryption, they…
-
"UC Prepares to Host Statewide Cybersecurity Exercise"The experience gained at the largest unclassified Department of Defense (DOD) cyber defense exercise helps the Ohio Cyber Range Institute (OCRI) at the University of Cincinnati (UC) develop the country's civilian cybersecurity operation in Ohio. Last…
-
"Meet NoEscape, the Return of the Avaddon RaaS Gang"NoEscape appears to be the return of Avaddon, a Ransomware-as-a-Service (RaaS). Since June 2023, NoEscape has used double-extortion techniques against large companies. The cybercriminals behind it steal data from Windows, Linux, and VMware ESXi servers…
-
"Henry Ford Health Confirms Data Breach Affecting 168,000 Patients"Henry Ford Health has recently confirmed that an email phishing scheme led to a data breach affecting 168,000 patients. Patients were told Monday that someone conducting an email phishing scheme gained access to business email accounts on March 30…
-
"Google Fixes 'Bad.Build' Vulnerability Affecting Cloud Build Service"Google patched a flaw in its Cloud Build service that allowed attackers to manipulate application images and infect users. Although a fix for the vulnerability was released in June, the researchers who discovered it have just published a detailed…
-
"Admins of Genesis Market Marketplace Sold Their Infrastructure on a Hacker Forum"The administrators of Genesis Market on the dark web have announced the sale of their platform to a threat actor who will resume operations next month. In April, the FBI seized Genesis Market, a marketplace for stolen credentials, launched in 2017.…
-
"Nigerian Man Sentenced to 8 Years in US Prison for $8 Million BEC Scheme"A Nigerian national who had been living in the United Arab Emirates has recently been sentenced to more than eight years in a US prison for his role in an $8 million cybercrime scheme. The man, 31-year-old Olalekan Jacob Ponle, aka Mark Kain, and…
-
"Seven New Gadgets Added to Riskiest Connected Devices List"For 2023, Forescout's list of the riskiest connected devices includes seven new entries that security teams should consider when securing their assets. The cybersecurity vendor's annual list, published on July 13, now includes Virtual Private Network (…