Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure

Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours. Continue reading Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure

Act-of-War Clauses Cloud Cyber Insurance Coverage

Angus Loten reports: From Europe to the Middle East, geopolitical conflicts have companies rereading the fine print on insurance policies that deny coverage for wartime cyberattacks. Act-of-war exclusions—a common provision in homeowners, life and trav… Continue reading Act-of-War Clauses Cloud Cyber Insurance Coverage

Social engineering attacks on open source developers are escalating

North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call that tricked him into installing a RAT posings as a software update. They used th… Continue reading Social engineering attacks on open source developers are escalating

Who really runs your VPN — and what that may mean for your privacy

Over on Codamail (fka Cotse.net), Steve Gielda has updated his research on VPN infrastructure and its implications for your privacy. From that article: The Question VPN providers market themselves as independent services in diverse jurisdictions. This … Continue reading Who really runs your VPN — and what that may mean for your privacy