Hackers Demanded $8K from Sacramento Regional Transit after Attack

Hackers demanded a ransom of approximately $8,000 after they attacked the Sacramento Regional Transit’s (SacRT) computer system. The attack occurred on 18 November, reports The Sacramento Bee, when unknown hackers defaced the public transportation agency’s main website with the following message: I’m sorry to modify the home page, i’m good hacker, i I just want … Read More The post Hackers Demanded $8K from Sacramento Regional Transit after Attack appeared first on The State of Security.
Read more

How the Grinch (and his band of hackers) stole Christmas

In 2017 Hackers abound and we are all aware of it. However be aware that during the holiday season hackers are extra giving…of phishing attempts, malware, and Trojans, which all help them steal from you or your favorite retailer due to our laziness and lack of knowledge. Below are a list of a dirty dozen… The post How the Grinch (and his band of hackers) stole Christmas appeared first on CCSI.
Read more

IcedID – New Banking Trojan targets US-based companies with web injects

The malware research team in the UAB Computer Forensics Research Lab is widening its horizon and is always on the look out for new malware families. While researching new malware families, Arsh Arora, Ph.D. Candidate at UAB, found some chatter about the new banking trojan IcedId.  Although ransomware is the most discussed malware in the press for many financial institutions the most feared malware type is the Banking Trojan. The objective of most banking trojans is to steal banking credentials and eventually steal the money from account holders.IcedID Banking Trojan IBM X-Force discovered a new banking trojan IcedID that was first detected in September 2017. It is known as modified version of the Zeus Trojan. The following trojan spreads by Emotet worm which is able to spread from machine to machine inside a network via weak administrator passwords.One of our malware research team members, Shawn Sharp,  decided to dig into this malware. IBM had already provided a detailed explanation of the infection part, so we decided to take a different approach and focused on analyzing the web injects on a number of websites.The sample used to test was:MD5 - a6531184ea84bb5388d7c76557ff618d59f951c393a797950b2eb3e1d6307013Virus Total Detection - 49/67. The sad part is that...
Read more

Weekly Cyber Risk Roundup: More Payment Card Breaches and Dark Web Arrests

Payment card breaches were back in the news again this week as Forever 21 announced that it is investigating a point-of-sale breach (POS) at some of its stores, and several other organizations issued breach announcements related to stolen payment card data. Forever 21 said that it received a report from a third party about potential… Read More
Read more

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations, and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate such risk by implementing foundational security controls. For example, enterprises can monitor their important files for change using file integrity monitoring (FIM). This security measure enables IT security teams to … Read More The post What Is Vulnerability Management? appeared first on The State of Security.
Read more

Ransomware via RDP (Remote Desktop Protocol)

For Sophos, Mark Stockley describes how scammers are using RDP, a tool intended to cut down network and system administration costs for companies by allowing sysadmins and help-desk operators to access their customers’ systems remotely, to give them almost unlimited potential to reconfigure apps and services, making installing and executing ransomware a breeze. Ransomware-spreading hackers
Read more
Page 1 of 8012345...102030...Last »