Anatomy of a BlackCat Attack Through the Eyes of Incident Response

Incident response experts at Sygnia provide a detailed blow-by-blow of a BlackCat ransomware attack and share tips for survival.
The post Anatomy of a BlackCat Attack Through the Eyes of Incident Response appeared first on SecurityWeek.
Continue reading Anatomy of a BlackCat Attack Through the Eyes of Incident Response

US Gov Disrupts BlackCat Ransomware Operation; FBI Releases Decryption Tool

The US government announced the disruption of the notorious BlackCat ransomware-as-a-service operation and released a decryption tool to help organizations recover hijacked data.
The post US Gov Disrupts BlackCat Ransomware Operation; FBI Releases Decr… Continue reading US Gov Disrupts BlackCat Ransomware Operation; FBI Releases Decryption Tool

Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen

Compromised data includes names, dates of birth, Social Security numbers, health and insurance information, and driver’s license numbers.
The post Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen appeared first on SecurityWeek.
Continue reading Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen

Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

The hijacked data includes driver’s license numbers and/or social security numbers from a Caesars Entertainment loyalty database.
The post Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database appeared first on SecurityWeek.
Continue reading Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death. Continue reading Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”