"Cactus Ransomware Gang Claims the Theft of 1.5TB of Data From Energy Management and Industrial Automation Firm Schneider Electric"

"Cactus Ransomware Gang Claims the Theft of 1.5TB of Data From Energy Management and Industrial Automation Firm Schneider Electric"

The Cactus ransomware group claims to have stolen 1.5TB of data from the energy management and industrial automation company Schneider Electric. The attack affected the company's Sustainability Business division, disrupting Schneider Electric's Resource Advisor cloud platform services. According to Kroll researchers, the Cactus ransomware operation has been active since March 2023 and relies on multiple legitimate tools to achieve remote access.

Submitted by grigby1 CPVI on

"PlayStation Portal Hacked to Emulate Old PSP Titles"

"PlayStation Portal Hacked to Emulate Old PSP Titles"

Hackers have demonstrated that the new PlayStation Portal, which is a limited device for streaming games remotely from a PS5 console, is capable of much more. Andy Nguyen, a cloud vulnerability researcher, together with two other engineers, hacked the PlayStation Portal to run PPSSPP, a PlayStation Portable (PSP) emulator. The PSP is a standalone handheld portable console that was released in 2004 and does not require a wired console to stream games from. Nguyen confirmed that the hack only required software modifications, not hardware changes.

Submitted by grigby1 CPVI on

NSA Awards Authors of Study of Automated Attacks on New Webservers

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots,” as the winner of its 11th Annual Best Scientific Cybersecurity Paper Competition.
Submitted by Amy Karns on

"Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation"

"Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation"

The LockBit ransomware operation has recently been severely disrupted by an international law enforcement operation that involved the seizure of servers and several individuals getting arrested or charged.  LockBit domains currently display a seizure notice informing visitors that the site is controlled by law enforcement, specifically the UK’s National Crime Agency (NCA).

Submitted by Adam Ekwall on

"Anatsa Android Banking Trojan Continues to Spread via Google Play"

"Anatsa Android Banking Trojan Continues to Spread via Google Play"

According to security researchers at ThreatFabric, the Android banking trojan named Anatsa has evolved, and its attacks are more targeted.  Anatsa has been active for about four years and can target more than 600 mobile banking applications worldwide, infecting devices via malicious droppers uploaded to Google Play.  In June last year, three identified droppers had amassed roughly 30,000 installs via the application store.

Submitted by Adam Ekwall on

"Wyze Camera Glitch Gave 13,000 Users a Peek Into Other Homes"

"Wyze Camera Glitch Gave 13,000 Users a Peek Into Other Homes"

Wyze recently shared more details on a security incident that impacted thousands of users recently and said that at least 13,000 customers could get a peek into other users' homes.  The company blames a third-party caching client library recently added to its systems, which had problems dealing with a large number of cameras that came online all at once after a widespread outage that occurred on 2/16.  The company noted that multiple customers reported seeing other users' video feeds under the Events tab in the app since Friday.

Submitted by Adam Ekwall on

"Israeli Aircraft Survive Cyber-Hijacking Attempts"

"Israeli Aircraft Survive Cyber-Hijacking Attempts"

Two flights bound for Israel over the past week have suffered attempts to hijack their communications and divert the aircraft.  The El Al flights were both travelling from Thailand to Israel’s Ben Gurion international airport and apparently encountered “hostile elements.” No group has claimed responsibility. Although the aircraft were flying over an area in which Iranian-backed Houthis are active, sources have claimed it could be the work of a group operating from Somaliland an unrecognized state in the Horn of Africa.

Submitted by Adam Ekwall on

"Ukrainian Raccoon Infostealer Operator Extradited to US"

"Ukrainian Raccoon Infostealer Operator Extradited to US"

A Ukrainian national charged with operating the Raccoon Infostealer malware-as-a-service (MaaS) has recently made an appearance in a US court after being extradited from the Netherlands.  Mark Sokolovsky, 28, was arrested in March 2022 after the FBI and law enforcement agencies in Italy and the Netherlands dismantled the Raccoon Infostealer infrastructure.  In October 2022, Sokolovsky was indicted in the US for his involvement in the distribution of the Raccoon Infostealer malware to millions of computers worldwide.

Submitted by Adam Ekwall on

"Shuffling the Deck for Privacy"

"Shuffling the Deck for Privacy"

A KAUST research team has developed a Machine Learning (ML) approach that addresses a major medical research challenge by integrating an ensemble of privacy-preserving algorithms. The challenge is using the power of Artificial Intelligence (AI) to accelerate genomic data discovery while protecting individuals' privacy. According to KAUST's Xin Gao, omics data typically contains a large amount of private information, such as gene expression and cell composition. This information can often be linked to a person's disease or health status.

Submitted by grigby1 CPVI on

"Using AI to Develop Enhanced Cybersecurity Measures"

"Using AI to Develop Enhanced Cybersecurity Measures"

Los Alamos National Laboratory (LANL) researchers are using Artificial Intelligence (AI) to address significant shortcomings in large-scale malware analysis, improving the classification of Microsoft Windows malware and taking more steps towards improved cybersecurity measures. Through their method, the team set a new world record for classifying malware families. The team's approach achieves realistic malware family classification using semi-supervised tensor decomposition methods and selective classification, specifically the reject option.

Submitted by grigby1 CPVI on
Subscribe to