Malware

100 MILLION Americans in UnitedHealth PII Breach
Richi Jennings | | 2fa, 2FA policies, 2FA/MFA, ALPHV, ALPHV ransomware, Blackcat, BlackCat ransomware, BlackCat/ALPHV ransomware, Change Healthcare, HIPAA, hipaa laws, hipaa rule, MFA, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), multi-factor-auth, Multifactor Authentication, multifactorauthentication, Ransomware, SB Blogwatch, Steven Martin, two-factor-authentication.2fa, UHG, UnitedHealth
Not cute: $UNH’s Change Healthcare unit paid a big ransom—its IT was as weak as a kitten ...
Security Boulevard

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
David Michael Berry | | Breach, Cyber Security, Cybersecurity, David Michael Berry, Malware, Ransomware, security
Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a ...

Army Cloud Program to Help SMBs Meet DoD Cyber Requirements
Jeffrey Burt | | Cloud computing security, Cybersecurity, SMB Cybersecurity, U.S. Army, U.S. Department of Defense
The U.S. Army is developing a cloud environment called N-CODE that will give smaller businesses access to the security technologies they need to meet stringent DoD cybersecurity requirements and compete for defense ...
Security Boulevard

More Ransoms Being Paid and More Data Being Lost: Hornetsecurity
A survey of IT professionals by Hornetsecurity found that while the number of ransomware victims are paying the ransoms, more of the data is being lost. In addition, while ransomware protection is ...
Security Boulevard
Emulating the Opportunistic and Lightweight Lumma Stealer
Francis Guibernau | | adversary emulation, Broad-Based Attacks, Lumma Stealer, LummaC2, Malware, Malware-as-a-Service (MaaS)
AttackIQ has released a new assessment template that addresses the numerous post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the subscription-based information stealer known as Lumma Stealer. The post Emulating the Opportunistic ...

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention
Joe Ariganello | | Blog, cyber attacks, Cyber Threats, Data breach, Malware, nation-state attacks, Nation-State Bad Actors, National Cybersecurity Strategy, supply chain
Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking ...
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

Generative AI Fueling More Sophisticated Cyberattacks: Survey
Jeffrey Burt | | AI Cybersecurity, Data encryption, Employee Training and Awareness, Generative AI risks
Organizations say generative AI is fueling a surge of more sophisticated cyberattacks and that they feel unprepared for the onslaught, but a Keeper Security survey found they are investing more in such ...
Security Boulevard
Domain Reputation Update Apr 2024 – Sept 2024
This reporting period our domain experts observed 36 million new domains and listed 1.8 million domains. In a surprising turn of events - “apple” dropped out of the Top 20 phishing terms! ...

Digital Crack for Kids: TikTok Sued Again by 14 AGs
Richi Jennings | | Bytedance, children, Children and smartphones, Children's Online Privacy Protection Act (COPPA), china, chinese government, Coppa, Privacy, SB Blogwatch, social media, spyware, TikTok, TikTok Ban, Won’t somebody think of the children?
For You Plague: TikTok’s in trouble once more—this time, some states complain it’s breaking laws by harvesting children’s data and keeping them addicted ...
Security Boulevard