SAP Applications Increasingly in Attacker Crosshairs, Report Shows

Malicious hackers are targeting SAP applications at an alarming pace, according to warnings from Onapsis and Flashpoint.
The post SAP Applications Increasingly in Attacker Crosshairs, Report Shows appeared first on SecurityWeek.
Continue reading SAP Applications Increasingly in Attacker Crosshairs, Report Shows

A Closer Look at the Snatch Data Ransom Group

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang’s internal operations. Today, we’ll take a closer look at the history of Snatch, its alleged founder, and their claims that everyone has confused them with a different, older ransomware group by the same name. Continue reading A Closer Look at the Snatch Data Ransom Group

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with. Both of these qualities make stolen or ill-gotten code-signing certificates attractive to cybercriminal groups, who prize their ability to add stealth and longevity to malicious software. This post is a deep dive on “Megatraffer,” a veteran Russian hacker who has practically cornered the underground market for malware focused code-signing certificates since 2015. Continue reading Ask Fitis, the Bear: Real Crooks Sign Their Malware

Flashpoint Ignite accelerates cross-functional risk mitigation and prevention

Flashpoint has released Ignite, a new intelligence platform that accelerates cross-functional risk mitigation and prevention across CTI, vulnerability management, national security, and physical security teams. Ignite combines Flashpoint’s intell… Continue reading Flashpoint Ignite accelerates cross-functional risk mitigation and prevention

Giving a Face to the Malware Proxy Service ‘Faceless’

For the past seven years, a malware-based proxy service known as “Faceless” has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we’ll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name. Continue reading Giving a Face to the Malware Proxy Service ‘Faceless’

Flashpoint and Google Cloud expand partnership to deploy generative AI

Flashpoint has expanded its partnership with Google Cloud to deploy next-generation intelligence solutions, including generative AI, within the Flashpoint product suite. This initiative will revolutionize how organizations detect security threats and r… Continue reading Flashpoint and Google Cloud expand partnership to deploy generative AI

FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers

Several domain names tied to Genesis Market, a bustling cybercrime store that sold access to passwords and other data stolen from millions of computers infected with malicious software, were seized by the Federal Bureau of Investigation (FBI) today. Sources tell KrebsOnsecurity the domain seizures coincided with “dozens” of arrests in the United States and abroad targeting those who allegedly operated the service, as well as suppliers who continuously fed Genesis Market with freshly-stolen data. Continue reading FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers

Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Flashpoint Intel Web Site Compromise – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Flashpoint Intel Web Site Compromise – An OSINT Analysis – A PDF Paper

Preventing a ransomware attack with intelligence: Strategies for CISOs

Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In fact, when organizations are armed with intelligence that’s timely, relevant,… Continue reading Preventing a ransomware attack with intelligence: Strategies for CISOs

Infosec products of the month: November 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, Forescout, ForgeRock, ImmuniWeb, Keyo, Lacework, LOKKER, Mitek, NAVEX, OneSpan, … Continue reading Infosec products of the month: November 2022