The effects of law enforcement takedowns on the ransomware landscape

While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the August 2023 disruption of the Qakbot botnet has had one notable effect: ransomware affiliates have switch… Continue reading The effects of law enforcement takedowns on the ransomware landscape

Broadcom Merges Symantec and Carbon Black Into New Business Unit

Fresh off its $69 billion acquisition of VMware, Broadcom creates an Enterprise Security Group unit that merges Symantec and Carbon Black.
The post Broadcom Merges Symantec and Carbon Black Into New Business Unit appeared first on SecurityWeek.
Continue reading Broadcom Merges Symantec and Carbon Black Into New Business Unit

Most dual ransomware attacks occur within 48 hours

Since July 2023, the Federal Bureau of Investigation (FBI) has noticed a new trend: dual ransomware attacks on the same victim, occurring in close proximity of one another. Dual ransomware attacks Dual ransomware attacks are when against the same victi… Continue reading Most dual ransomware attacks occur within 48 hours

Attackers use fallback ransomware if LockBit gets blocked

Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates are using the 3AM ransomware as a fallback option in case LockBit gets flagg… Continue reading Attackers use fallback ransomware if LockBit gets blocked

The rise and evolution of supply chain attacks

A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst in the Symantec Threat Hunte… Continue reading The rise and evolution of supply chain attacks

New Buhti ransomware uses leaked payloads and public exploits

A newly identified ransomware operation has refashioned leaked LockBit and Babuk payloads into Buhti ransomware, to launch attacks on both Windows and Linux systems. Use of public exploits One notable aspect of the attackers leveraging the Buhti ransom… Continue reading New Buhti ransomware uses leaked payloads and public exploits

3CX breach linked to previous supply chain compromise

Pieces of the 3CX supply chain compromise puzzle are starting to fall into place, though we’re still far away from seeing the complete picture. In the meantime, we now also know that: The source of the 3CX breach was a compromised installer for X… Continue reading 3CX breach linked to previous supply chain compromise

Ransomware group behind Oakland attack strengthens capabilities with new tools, researchers say

The group known as PLAY is using custom tools researchers say allow it to be faster and more efficient when carrying out ransomware attacks.

The post Ransomware group behind Oakland attack strengthens capabilities with new tools, researchers say appeared first on CyberScoop.

Continue reading Ransomware group behind Oakland attack strengthens capabilities with new tools, researchers say

SVB account holders targeted with phishing, scams

After news broke late last week about Silicon Valley Bank’s bank run and collapse, security researchers started warning SVB account holders about incoming SVB-related scams and phishing attempts. Another reminder: just because caller ID says FDIC… Continue reading SVB account holders targeted with phishing, scams

Navigating the ever-changing landscape of digital security solutions

Recently, Entrust named Bhagwat Swaroop as President, Digital Security Solutions. In this role, Bhagwat will lead the evolution, growth, and expansion of the Entrust Digital Security portfolio, which includes solutions for data encryption, public and p… Continue reading Navigating the ever-changing landscape of digital security solutions