API security ransomware extortion shift

AWS re:Invent 2023: Ransomware Defense

Shira Rubinoff talks with Naj Husain from Elastio at AWS re:Invent ...
Security Boulevard
AI code fixing

Attackers Finding Novel Ways to Abuse GitHub: ReversingLabs

Threat actors are finding new ways to take advantage of GitHub in hopes of tricking developers into putting malicious code into their software and sending to users downstream, according to researchers with ...
Security Boulevard
BlackCat ALPHV ransomware DOJ FBI

DOJ Seizes Ransomware Site as BlackCat Threatens More Attacks

U.S. law enforcement agencies said they shut down the online operations of the notorious Russia-linked BlackCat ransomware-as-a-service (RaaS) group and developed a decryption tool that will help more than 500 victims regain ...
Security Boulevard

Krasue RAT Malware: A New Threat to Linux Systems

In the field of cybersecurity, a potent and covert threat called Krasue has surfaced. This remote access trojan has been silently infiltrating Linux systems, primarily targeting telecommunications companies since 2021. This blog ...

Microsoft Alert: COLDRIVER Credential Theft Rising Again

In a recent Microsoft security alert, the notorious threat actor known as COLDRIVER has escalated its credential theft activities, targeting entities strategically significant to Russia. Simultaneously, it has refined its capabilities to ...
API security ransomware extortion shift

Play Ransomware Has Hit 300 Entities Worldwide: FBI

| | cisa, FBI, Play, Ransomware
The Play ransomware group, which was behind such high-profile attacks as those on the city of Oakland, California, and Dallas County, Texas, is behind at least 300 similar cyber-incidents since June 2022, ...
Security Boulevard
SEC rules, cybersecurity, SEC cyber data breach rules

Controversial SEC Cyber Disclosure Rules Take Effect

They’ve been detailed, debated, and fretted about for months, but as of today, the Securities and Exchange Commission’s new set of rules dictating how and when public companies must disclose “material” cyberattacks ...
Security Boulevard
DDoS environmental services Cloudflare

NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks

A new multiplatform threat that uses the peer-to-peer (P2P) NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service (DDoS) attacks to a remote access ...
Security Boulevard

The Rise of Cheap Infostealer Malware

What is infostealer malware, and how can security teams protect against it?  Of late, during my dark web research, I have seen a notable increase in discussions and utilization of infostealer malware ...
Microsoft Storm-1152 fake accounts CaaS

Microsoft Targets Threat Group Behind Fake Accounts

Microsoft seized parts of the infrastructure of a prolific Vietnam-based threat group that the IT giant said was responsible for creating as many as 750 million fraudulent Microsoft accounts that were then ...
Security Boulevard

Secure Guardrails