Treasury sanctions North Korea IT worker scheme facilitators and front organizations

As the sanctions-evading scheme has grown, so too has the U.S. government’s response.

The post Treasury sanctions North Korea IT worker scheme facilitators and front organizations appeared first on CyberScoop.

Continue reading Treasury sanctions North Korea IT worker scheme facilitators and front organizations

Microsoft details Storm-0501’s focus on ransomware in the cloud

The financially motivated threat group demonstrates deep knowledge of hybrid cloud environments, which allows it to rapidly steal sensitive data, destroy backups and encrypt systems for ransomware.

The post Microsoft details Storm-0501’s focus on ransomware in the cloud appeared first on CyberScoop.

Continue reading Microsoft details Storm-0501’s focus on ransomware in the cloud

Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June

The vendor, which has been widely targeted, said the memory-overflow vulnerability can result in remote-code execution or denial of service.

The post Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June appeared first on CyberScoop.

Continue reading Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June

Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent

A threat group Google tracks as UNC6395 systematically stole large amounts of data from Salesforce customer instances by using OAuth tokens stolen from Salesloft Drift, researchers said.

The post Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent appeared first on CyberScoop.

Continue reading Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent

Data I/O reports business disruptions in wake of ransomware attack

The electronics manufacturer and software vendor serves major automotive suppliers and top tech firms.

The post Data I/O reports business disruptions in wake of ransomware attack appeared first on CyberScoop.

Continue reading Data I/O reports business disruptions in wake of ransomware attack

Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses

Operation Serengeti 2.0 dismantled almost 11,500 malicious infrastructures between June and August. Officials arrested more than 1,200 alleged cybercriminals.

The post Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses appeared first on CyberScoop.

Continue reading Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses

Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS

The defect, which affects the company’s most popular devices, has been exploited in an “extremely sophisticated attack against specific targeted individuals,” Apple said.

The post Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS appeared first on CyberScoop.

Continue reading Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS

CrowdStrike warns of uptick in Silk Typhoon attacks this summer

The China-affiliated espionage group, which CrowdStrike tracks as Murky Panda, has been linked to more than a dozen incident response cases since late spring.

The post CrowdStrike warns of uptick in Silk Typhoon attacks this summer appeared first on CyberScoop.

Continue reading CrowdStrike warns of uptick in Silk Typhoon attacks this summer

Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator

The DDoS botnet was among the powerful on record, allegedly exceeding six terrabits per second during its largest attack, authorities said. Victims are spread across 80 countries.

The post Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator appeared first on CyberScoop.

Continue reading Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator

Cisco discloses maximum-severity defect in firewall software

The vulnerability, which Cisco said it discovered during internal security testing, could allow unauthenticated attackers to execute high-privilege commands.

The post Cisco discloses maximum-severity defect in firewall software appeared first on CyberScoop.

Continue reading Cisco discloses maximum-severity defect in firewall software