Understanding How Hackers Recon
Understanding How Hackers Recon March 07, 2022The Hacker News Cyber-attacks keep increasing and evolving but, regardless of the degree of complexity used by hackers to gain access, get a foothold, cloak their malware, execute their payload or exfiltrate data, their attack will begin with reconnaissance. They will do their utmost to uncover exposed assets and […]
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine
Article Written By: Juan Andrés Guerrero-Saade / February 23, 2022 Executive Summary On February 23rd, the threat intelligence community began observing a new wiper malware sample circulating in Ukrainian organizations. Our analysis shows a signed driver is being used to deploy a wiper that targets Windows devices, manipulating the MBR resulting in subsequent boot failure. […]
Ransomware Continues to Rise
While we are trying to protect our immune systems from the coronavirus, our computer systems and data are also under attack. Ransomware is a type of malicious software, also known as malware, designed to block access to and/or threaten to publish data and computer systems. The attacker will encrypt the system or data until a […]
Critical Security Lo4J Zero-Day Alert!
CRITICAL SECURITY LOG4J ZERO-DAY ALERT! A VULNERABILITY IN a widely used logging library has become a full-blown security meltdown, affecting digital systems across the internet. Hackers are already attempting to exploit it, but even as fixes emerge, researchers warn that the flaw could have serious repercussions worldwide. WHAT DEVICES AND APPLICATIONS ARE AT RISK? Any […]
Evolving Ransomware Threats
Ransomware There has been an increase in ransomware attacks over the last 11 months, with no sign of slowing. These threats have evolved with threat actors now planting payloads disguised as legitimate core services, and bypasses most standard detection tools. Companies are being affected and suffer days or weeks of downtime, crippling core business functions, […]
Facebook, SnapChat, WhatsApp Down Simultaneously!
SAN FRANCISCO — Facebook and some of its apps, including Instagram and WhatsApp, appeared to go down at the same time on Monday for many users, who turned to Twitter and other social media platforms to lament the outage. The social network and its apps began displaying error messages before noon Eastern time, users reported. […]
Ransomware Volumes Hit Record Highs in 2021
The second quarter of the year saw the highest volumes of ransomware attacks ever, with Ryuk leading the way. Ransomware has seen a significant uptick so far in 2021, with global attack volume increasing by 151 percent for the first six months of the year as compared with the year-ago half. Meanwhile, the FBI has […]
Unpatched Fortinet Bug Allows Firewall Takeovers
The OS command-injection bug, in the web application firewall (WAF) platform known as FortiWeb, will get a patch at the end of the month. An unpatched OS command-injection security vulnerability has been disclosed in Fortinet’s web application firewall (WAF) platform, known as FortiWeb. It could allow privilege escalation and full device takeover, researchers said. FortiWeb […]
Crypto Hack Earned Crooks $600 Million!
In one of the largest cryptocurrency hacks to date, cyberattackers reportedly stole millions from the decentralized finance (DeFi) platform Poly Network. Attackers reportedly stole $600 million from the cryptocurrency platform Poly Network, in what experts say is one of the largest crypto heists to date. Poly Network, a decentralized finance (DeFi) platform based in China, […]
Simply Secure Group Welcomes Karmena McArthur as Senior Cybersecurity Consultant
Simply Secure Group, a Caribbean owned Cybersecurity company based in Fort Lauderdale, announced today the appointment of Karmena McArthur (CISSP, CEH, Security+, ITIL) as Senior Cybersecurity Consultant. With over ten (10) years’ in, Cybersecurity Auditing, Information Security, Strategic Security Management, Risk Assessment and Penetration Testing, Karmena has successfully helped companies build out their Information Security and Data privacy programmes, improving their overall security posture. […]