Social Engineering

AWS Seizes Domains Used by Russian Threat Group APT29
Jeffrey Burt | | Amazon Web Services (AWS), APT29, phishing attack, russia hacker, Ukraine cybersecurity
Cloud computing giant AWS, tipped off by Ukrainian security experts, seized domains that were being used by Russian threat group APT29 to send phishing emails to government officials and enterprises that contained ...
Security Boulevard

100 MILLION Americans in UnitedHealth PII Breach
Richi Jennings | | 2fa, 2FA policies, 2FA/MFA, ALPHV, ALPHV ransomware, Blackcat, BlackCat ransomware, BlackCat/ALPHV ransomware, Change Healthcare, HIPAA, hipaa laws, hipaa rule, MFA, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), multi-factor-auth, Multifactor Authentication, multifactorauthentication, Ransomware, SB Blogwatch, Steven Martin, two-factor-authentication.2fa, UHG, UnitedHealth
Not cute: $UNH’s Change Healthcare unit paid a big ransom—its IT was as weak as a kitten ...
Security Boulevard

Cybersecurity Awareness Month – Secure YOUR World
As the clock ticks, we come to a new Cybersecurity Awareness Month (CAM)! This marks the 20th year of October […] ...

Chinese Research Using Quantum System to Crack Encryption a ‘Cautionary Tale’
Chinese researchers used a D-Wave quantum computer to crack a 22-bit encryption key, which can be used as a cautionary tale for what may lie ahead with future quantum systems but doesn't ...
Security Boulevard

Apple Enrages IT — 45-Day Cert Expiration Fury
Richi Jennings | | 90-day certificates, 90-day TLS certificate validity, Apple, Apple Safari, browser, Browser Security, CA/B Forum, CA/Browser Forum, CAB Forum, certificate, Certificate and Key Lifecycle Management, Certificate and Key Management, Certificate Automation, mobile safari, Safari, SB Blogwatch, Sectigo
CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators ...
Security Boulevard

Digital Crack for Kids: TikTok Sued Again by 14 AGs
Richi Jennings | | Bytedance, children, Children and smartphones, Children's Online Privacy Protection Act (COPPA), china, chinese government, Coppa, Privacy, SB Blogwatch, social media, spyware, TikTok, TikTok Ban, Won’t somebody think of the children?
For You Plague: TikTok’s in trouble once more—this time, some states complain it’s breaking laws by harvesting children’s data and keeping them addicted ...
Security Boulevard

DOJ Wants to Claw Back $2.67 Million Stolen by Lazarus Group
Jeffrey Burt | | cryptocurrency asset theft, Department of Justice (DOJ), Lazarus Group, North Korean Hacking
The DOJ wants to seize $2.67 million from the $69 million in crypto the North Korean-backed Lazarus Group stole in from the options exchange Deribit in 2022 and online gambling platform Stake.com ...
Security Boulevard

Biggest Ever DDoS is Threat to OT Critical Infrastructure
Richi Jennings | | Analyzing DDoS Attacks, application-layer DDoS attacks, Cloudflare DDoS Protection, Critical Infrastructure, critical infrastructure attack, critical infrastructure attacks, Critical Infrastructure Security and Resilience Month, cyber attack on critical infrastructure, ddos, DDoS amplification, DDoS attack, distributed denial of service, Distributed denial of service (DDoS) attacks, distributed denial of service attack, ICS, ICS/SCADA systems, industrial control systems, Infrastructure, iot, operational technologies, operational technology, operational technology security, OT, SB Blogwatch, US critical infrastructure
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS) ...
Security Boulevard

Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam
In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was ...
Security Boulevard

Storm-0501 Gang Targets US Hybrid Clouds with Ransomware
The financially motivated Storm-0501 threat group is attacking hybrid cloud environments in the United States by compromising on-prem systems first and moving laterally into the cloud, stealing data and credentials and dropping ...
Security Boulevard