There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of attacks compared to the same period last year. The report also found that between … Continue reading DDoS attacks increased 33% in H1 2021
Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does… Continue reading Kaseya ransomware attackers say: “Pay $70 million and we’ll set everyone free”
A New York City man admitted to accessing more than 300 Snapchat accounts to steal victims’ nude pictures as part of a cyberstalking case that ensnared at least 14 people. David Mondore, 29, pleaded guilty Wednesday to hacking-related charges for orchestrating a scheme in which he would solicit explicit photos from college students by impersonating their friends. The fraud, in which Mondore would dupe Snapchat users into providing their passwords, represents only the latest example of ways that scammers exploit otherwise innocuous social media relationships to harass, abuse and torment unwitting users. “This case should serve as a cautionary reminder that many individuals lurking on social media use those platforms to engage in decidedly anti-social behavior,” U.S. Attorney James Kennedy said in a statement. Unlike advanced cyber-espionage activity or digital extortion, cyberstalking is typically aimed at individual victims who have few obvious solutions. While instances of the problem are difficult […]
The post Snapchat stalker pleads guilty to using stolen passwords to torment college students appeared first on CyberScoop.
Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools.
The post EA’s Source: It’s in the Game (and in Hackers’ Hands) appeared first on Security Boulevard.
Continue reading EA’s Source: It’s in the Game (and in Hackers’ Hands)
Over the years, the term ransomware has taken on a new meaning for many businesses and local governments. This used to be considered a relatively new and emerging form of malware. Now, attackers have transformed it into a sophisticated and aggressive form of cyber extortion. Businesses feel the impact of ransomware globally. Their leaders need to be […]
This seems to be a new tactic:
Emsisoft has identified two distinct tactics. In the first, hackers encrypt data with ransomware A and then re-encrypt that data with ransomware B. The other path involves what Emsisoft calls a “side-by-side encryption” attack, in which attacks encrypt some of an organization’s systems with ransomware A and others with ransomware B. In that case, data is only encrypted once, but a victim would need both decryption keys to unlock everything. The researchers also note that in this side-by-side scenario, attackers take steps to make the two distinct strains of ransomware look as similar as possible, so it’s more difficult for incident responders to sort out what’s going on…
Zscaler announced a report featuring analysis of key ransomware trends and details about the most prolific ransomware actors, their attack tactics and the most vulnerable industries being targeted. The research team analyzed over 150 billion platform t… Continue reading Double-extortion ransomware attacks on the rise
As we head into 2021, ransomware is making another resurgence, particularly in targeted attacks from highly organized hacker groups. In fact, cybercrime is surging since the start of the pandemic. When IT and security professionals plan how to respond,… Continue reading Protecting the human attack surface from the next ransomware attack
Oil and gas company Shell is the latest organization to get caught up in the hack that targeted IT provider Accellion’s file-sharing platform, the energy company says. The suspected criminal hackers behind the breach, who have gone after victims around the world using vulnerabilities in Accellion’s file transfer application (FTA), have accessed some personal data as well as data belonging to Shell stakeholders and subsidiaries, the company said on March 16. Shell had used the FTA to securely transfer large files. The incident appears to have only impacted the Accellion file transfer service. Shell claims there is “no evidence” so far that the incident has affected Shell’s IT system itself. Shell is working with authorities and regulators to investigate the incident, the firm said. The list of companies that use Accellion’s FTA that have fallen victim to the Accellion hack continues growing by the day. A Michigan-based savings bank and […]
Qualys has confirmed that the Clop ransomware gang is behind the cyber attack that exploited Accellion exploit.
This is a post from HackRead.com Read the original post: IT Security firm Qualys extorted by Clop gang after data breach
Continue reading IT Security firm Qualys extorted by Clop gang after data breach