Britain's The Guardian newspaper has asked staff to continue working from home until Jan. 23 as the company continues to resolve issues with its network, which was compromised by ransomware hackers in December. The attack affected on-premises infrastructure but left cloud-based systems unscathed.
The U.S. attorney in New York has established a task force to trace and recover funds missing from FTX and manage probes related to the firm's collapse. The team comprises prosecutors with expertise in securities and commodities fraud, money laundering and asset forfeiture and cybersecurity.
Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by CrowdStrike as being "a previously undisclosed exploit method for Exchange," to gain remote, direct access to servers it hosted.
The BlackCat ransomware-as-a-service group created a spoofed website closely mimicking the website of a victim in order to spread stolen data online. The victim is a small U.S. accounting firm whose stolen files apparently include tax returns and passport scans.
U.S. banking regulators warned banks to be wary of cryptocurrencies, writing in a joint statement that digital assets on decentralized networks are "highly likely to be inconsistent with safe and sound banking requirements." The missive comes after a volatile year for cryptocurrency.
Former cryptocurrency billionaire Sam Bankman-Fried entered a "not guilty" plea in Manhattan federal district court Tuesday. He faces up to 115 years in prison if found guilty on all counts. Bankman-Fried has been out on $250 million bail in home detention with his parents in California.
A Toronto pediatric hospital says it has restored nearly two-thirds of the systems affected by a mid-December ransomware attack but will evaluate whether to use a decryptor supplied by the LockBit ransomware-as-a-service group. LockBit says an affiliate violated a policy against attacking hospitals.
Poland is warning that Russian hackers have intensified activities in national cyberspace with the aim of "destabilization, intimidation and sowing chaos." Poland is a staging ground for military aid to Kyiv and a destination for more than 1.4 million refugees who fled Moscow's war of conquest.
After two sensational years in the public markets during the height of COVID-19, 2022 was a rude awakening for the cybersecurity industry. The four-headed monster of inflation, interest rate hikes, supply chain shortages and the ongoing Russia-Ukraine war dragged most stock prices down.
Malaysian Communications and Digital Minister Fahmi Fadzil has ordered an inquiry into an alleged massive data breach that reportedly involves data of Maybank, Astro and the Election Commission. The alleged breach reportedly affects 13 million citizens.
Researchers uncovered thousands of Citrix servers that are vulnerable to two critical flaws, one of which is being actively exploited by nation-state hackers. Netgear also warned its customers about a denial-of-service vulnerability affecting some of its devices.
Many ransomware-wielding attackers are expert at preying on their victims' compulsion to clean up the mess. Witness victims' continuing willingness to pay a ransom - separate to a decryptor - in return from a promise from extortionists that they will delete stolen data. As if.
The Bahamas Securities Commission seized digital assets worth $3.5 billion from local firm FTX Digital Markets. The regulator says the funds were at risk of "imminent dissipation" due to hack attacks and will temporarily remain under its exclusive control, stored in secure digital wallets.
According to Accenture Security's Cyber Threat Intelligence team, information stealer malware - malicious software designed to steal information, including passwords - became one of the most discussed malware types on the cybercriminal underground in 2022.
Expel has released its latest quarterly threat report, which looks at continued identity-based attacks and the impact of MFA fatigue. Jon Hencinski shares insights on attack trends, gaps in compensating controls and what to look for in pre-ransomware activity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.