"LockBit Ransomware Gang Has Over $110 Million in Unspent Bitcoin"

"LockBit Ransomware Gang Has Over $110 Million in Unspent Bitcoin"

According to an analysis of hundreds of cryptocurrency wallets linked to the LockBit ransomware operation, the gang behind it received over $125 million in ransom payments over the past 18 months. After the LockBit takedown in Operation Cronos, the National Crime Agency (NCA) in the UK, with help from the blockchain analysis company Chainalysis, identified over 500 active cryptocurrency addresses. Law enforcement obtained 30,000 Bitcoin addresses that were used to manage the group's profits from ransom payments.

Submitted by Gregory Rigby on

"Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft"

"Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft"

A vulnerability in Apple's popular Shortcuts app enables attackers to access sensitive data across the device without the user's permission. The Shortcuts app, designed for macOS and iOS, aims to automate tasks. According to Bitdefender's analysis, the vulnerability tracked as CVE-2024-23204, allows the creation of a malicious Shortcuts file that can bypass Apple's Transparency, Consent, and Control (TCC) security framework, which is implemented to ensure apps explicitly request permission from the user before accessing specific data or functionalities.

Submitted by Gregory Rigby on

"AT&T Says the Outage to Its US Cellphone Network Was Not Caused by a Cyberattack"

"AT&T Says the Outage to Its US Cellphone Network Was Not Caused by a Cyberattack"

AT&T recently announced Thursday's hourslong outage to its U.S. cellphone network was due to a technical error, not a malicious attack.  The outage knocked out cellphone service for thousands of its users across the U.S. starting early Thursday before it was restored. AT&T blamed the incident on an error in coding without elaborating. National Security Council spokesman John Kirby said the Federal Communications Commission contacted AT&T about the outage, and the Department of Homeland Security and FBI were also looking into it.  

Submitted by Adam Ekwall on

"230k Individuals Impacted by Data Breach at Australian Telco Tangerine"

"230k Individuals Impacted by Data Breach at Australian Telco Tangerine"

Australian telecommunications provider Tangerine recently announced that the personal information of 230,000 individuals was stolen in a recent cyberattack.  The incident occurred on February 18 but was not discovered until two days later.  The company said that the attackers accessed a legacy customer database containing the information of roughly 230,000 current and former customer accounts.  The compromised personal information includes names, addresses, dates of birth, email addresses, mobile phone numbers, and Tangerine account numbers.

Submitted by Adam Ekwall on

"Cybersecurity Fears Drive a Return to On-Premise Infrastructure From Cloud Computing"

"Cybersecurity Fears Drive a Return to On-Premise Infrastructure From Cloud Computing"

Citrix reports that 42 percent of organizations surveyed in the US are considering or have already moved at least half of their cloud-based workloads back to on-premises infrastructures due to unexpected security issues, high project expectations, and more. According to Information Technology (IT) leaders, the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility issues, and service outages.

Submitted by Gregory Rigby on

"What's the Chat About Global Cybersecurity? - Cybersecurity and Data Protection in the European Union, the USA, and China: Does ChatGPT Really Make a Difference?"

"What's the Chat About Global Cybersecurity? - Cybersecurity and Data Protection in the European Union, the USA, and China: Does ChatGPT Really Make a Difference?"

A team of researchers examined the different approaches to cybersecurity and data protection taken by the EU, the US, and China. In addressing historical data concerns and evolving cyber threats, countries are considering the impact of Large Language Models (LLMs), such as ChatGPT. Cybersecurity and data privacy have emerged as significant concerns, affecting business operations and user safety.

Submitted by Gregory Rigby on

"Distributed Energy Resource Cybersecurity Framework Tool Shines in Solar Cybersecurity Assessment"

"Distributed Energy Resource Cybersecurity Framework Tool Shines in Solar Cybersecurity Assessment"

A new paper by National Renewable Energy Laboratory (NREL) researchers, presented at the 2023 IEEE Power and Energy Society's Innovative Smart Grid Technologies conference, emphasizes the importance of solar energy cybersecurity. Securing behind-the-meter Distributed Energy Resources (DERs) is critical as the global energy landscape evolves.

Submitted by Gregory Rigby on

"US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals"

"US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals"

The United States recently announced that it is offering big rewards for information on cybercriminals linked to the recently disrupted LockBit ransomware operation. The UK’s National Crime Agency (NCA) and other law enforcement agencies have seized LockBit domains and servers, causing significant disruption to the cybercrime operation. The NCA has mocked cybercriminals, posting a message in the hijacked LockBit panel informing affiliates that law enforcement may be in touch with them very soon.

Submitted by Adam Ekwall on

"'Critical ConnectWise RMM Bug Poised for Exploitation Avalanche"

"'Critical ConnectWise RMM Bug Poised for Exploitation Avalanche"

Those who use the ConnectWise ScreenConnect remote desktop management tool are being attacked following the release of a Proof-of-Concept (PoC) exploit for a critical security vulnerability in the platform. Researchers warn that the situation could escalate into a massive compromise event. ScreenConnect enables tech support and others to authenticate to a machine as if they were the user. Therefore, it is attractive to threat actors seeking to infiltrate high-value endpoints and other areas of corporate networks.

Submitted by Gregory Rigby on

"Collegiate Cyber Defenders Shine in CyberForce Program's Inaugural Conquer the Hill — Command Edition Competition"

"Collegiate Cyber Defenders Shine in CyberForce Program's Inaugural Conquer the Hill — Command Edition Competition"

The US Department of Energy's (DOE) CyberForce Program aims to help build a workforce of skilled cyber defenders for the energy sector by offering engaging competitions, webinars, career fairs, and skill-building resources. The DOE's Office of Cybersecurity, Energy Security, and Emergency Response (CESER) and Argonne National Laboratory (ANL) have announced the winners of the recent inaugural CyberForce Conquer the Hill - Command Edition competition.

Submitted by Gregory Rigby on
Subscribe to