Not For You: The Protecting Americans from Foreign Adversary Controlled Applications Act shouldn’t be enforced, orders President Trump. The post Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban appeared first on Security Boulevard.
Category: malware
Global Security News, Guest blog, malware, Ransomware
Medusa ransomware: what you need to know
Medusa is a ransomware-as-a-service (RaaS) platform that has targeted organisations around the world. Read more about it in my article on the Tripwire State of Security blog.
Application Security, Biden, Biden administration, Biden National Cybersecurity Strategy, Biden-Harris, china, China-linked Hackers, China-nexus cyber attacks, Cloud Security, Cyberlaw, Cybersecurity, Data Privacy, Data Security, DevOps, Endpoint, executive order cybersecurity, executive order on cybersecurity, Featured, Federal Government, Global Security News, Governance, Risk & Compliance, Humor, Identity & Access, Incident Response, Industry Spotlight, IoT & ICS Security, Joe Biden, malware, Mobile Security, Most Read This Week, Network Security, News, Peoples Republic of China, Popular Post, President Biden, president cybersecurity executive order, presidential executive order cybersecurity, SB Blogwatch, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, Threats & Breaches, US Federal Government, vulnerabilities, White House, white house executive order cybersecurity framework
This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
Wow. Just Wow.: Joseph Robinette Biden Jr. hits the emergency “do something” button. The post This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump appeared first on Security Boulevard.
Asia Pacific, china espionage, Cloud Security, Cybersecurity, Data Security, Endpoint, FBI investigation of cybercrime, Featured, Global Security News, Incident Response, Industry Spotlight, malware, Mustang Panda, Network Security, News, PlugX, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threat Intelligence, Threats & Breaches, windows malware
FBI Deletes PlugX Malware From Computers Infected by China Group
A Chinese-based threat group called Mustang Panda was using a variant of the PlugX malware to infected U.S. Windows computers and steal information. The FBI, with help from French authorities and a private company, deleted the malicious code from more than 4,200 systems. The post FBI Deletes PlugX Malware From Computers Infected by China Group…
Allstate, Analytics & Intelligence, android spyware, Arity, automaker, Car, cars, cellular IoT, cellular IoT security, Chrysler, Cloud Security, Connected Cars, Consumer IoT, Cyberlaw, Cybersecurity, Data Privacy, DevOps, Dodge, Endpoint, Featured, Fiat, Fuel Rewards, GasBuddy, Global Security News, Governance, Risk & Compliance, Humor, Incident Response, Industry Spotlight, insurance, Insurance Companies, insurance company, internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iOS spyware, IoT, IoT & ICS Security, Jeep, Lexus, Life360, malware, Maserati, Mazda, Mobile Security, Most Read This Week, mozilla, Mozilla Foundation, New Cars, News, Popular Post, privacy, Privacy4Cars, RAM, Routely, SB Blogwatch, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, Spyware, Stellantis, Texas Data Privacy and Security Act, Threat Intelligence, Threats & Breaches, Toyota, vehicle, vehicle cybersecurity, vehicle OTAs
Allstate Violates Drivers’ Privacy, Texas AG Alleges
Don’t Mess With Texas Privacy: “We will hold all these companies accountable,” rants state attorney general Ken Paxton (pictured). The post Allstate Violates Drivers’ Privacy, Texas AG Alleges appeared first on Security Boulevard.
china, cyberespionage, Global Security News, malware, North America, Security, us government
DOJ confirms FBI operation that mass-deleted Chinese malware from thousands of US computers
The FBI says it was authorized to mass-remove “PlugX” malware from more than 4,000 compromised machines in the United States © 2024 TechCrunch. All rights reserved. For personal use only.
CISA, Cloud Security, critical infrastructure assets, Cybersecurity, Data Security, Featured, Global Security News, Governance, Risk & Compliance, Incident Response, Industry Spotlight, malware, Network Security, News, Salt Typhoon cyberattack, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threat Intelligence, Threats & Breaches, Volt Typhoon
Critical Infrastructure Seeing Benefits of Government Program, CISA Says
CISA in two years has seen the number of critical infrastructure organizations signing up for its CPG services double, which has improved the overall security in most sectors, but more needs to be done to strengthen what has become a target adversarial state-sponsored threat groups. The post Critical Infrastructure Seeing Benefits of Government Program, CISA…
Cloud Security, Cybersecurity, Data Security, Featured, generative ai, Global Security News, Hacktivists, malware, Mobile Security, Network Security, News, Ransomware, Ransomware-as-a-Service (RaaS), Security Awareness, Security Boulevard (Original), Social - LinkedIn, Social - X, Sponsored Content, Spotlight, Threat Intelligence
FunkSec: A New Ransomware Group Buoyed by AI
A new ransomware group called FunkSec claimed 85 victims in December but its members appear to be lesser-skilled hackers using generative AI and inflated attack numbers to bolster their capabilities and reputation, according to Check Point researchers. The post FunkSec: A New Ransomware Group Buoyed by AI appeared first on Security Boulevard.
Botnet C&C, Global Security News, malware, Security Bloggers Network, Service Providers, Threat Intelligence
Botnet Threat Update July to December 2024
Overall botnet command control (C&C) activity decreased marginally by -4% between July and December last year. China dominated the Top 20 charts with increased botnet C&C activity across domain registrars and networks, ranking #1 globally for hosting botnet C&C servers. Download the latest report to learn more. The post Botnet Threat Update July to December…
Chinese cyber espionage, Cloud Security, Cybersecurity, Data Security, Endpoint, Exploits, Global Security News, ivanti, malware, Network Security, News, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threat Intelligence, vulnerabilities
Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability
Software maker Ivanti, which for more than a year has been plagued by security flaws in its appliance, unveiled two new ones this week, with Mandiant researchers saying that one likely is being activity exploited by China-linked threat groups. The post Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability appeared first on Security Boulevard.
data breach, Data loss, Global Security News, Guest blog, malware, Ransomware
Space Bears ransomware: what you need to know
The Space Bears ransomware gang stands out from the crowd by presenting itself better than many legitimate companies, with corporate stock images and a professional-looking leak site. Read more in my article on the Tripwire State of Security blog.
Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), exploit, Exploits, Global Security News, ivanti, malware, Mandiant, SPAWN, UNC5221, UNC5337, vulnerabilities, zero days
New zero-day exploit targets Ivanti VPN product
A year after a series of vulnerabilities impacting a pair of Ivanti VPN products prompted an emergency directive from the Cybersecurity and Infrastructure Security Agency to federal agencies, the Utah-based software firm is again experiencing issues with one of its signature systems. The company on Wednesday disclosed two vulnerabilities — CVE-2025-0282 and CVE-2025-0283 — that…
Cloud Security, Cybersecurity, data breach, Data Privacy, Data Security, Endpoint, Featured, Global Security News, Green Bay Packers, Industry Spotlight, malware, Mobile Security, Network Security, News, Security Boulevard (Original), skimming malware, Social - Facebook, Social - LinkedIn, Social - X, Spotlight, stolen data, Threat Intelligence, Threats & Breaches, YouTube
Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed
The data of more than 8,500 customers were exposed during an attack on the Green Bay Packers online retail website in which the hackers were able to bypass security measure and install malicious code, steal customers’ names, addresses, and credit card information. The post Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed…
AI, Artificial Intelligence, CAPTCHA, Global Security News, Krispy Kreme, malware, Podcast, ramsomware, Ransomware, Smashing Security
Smashing Security podcast #398: Fake CAPTCHAs, Harmageddon, and Krispy Kreme
This week, we delve into the dark world of fake CAPTCHAs designed to hijack your computer. Plus, the AI safety clock is ticking down – is doomsday closer than we think? And to top it off, we uncover the sticky situation of Krispy Kreme facing a ransomware attack. All this and more is discussed in…
CISA Emergency Directive, Cloud Security, Cybersecurity, Data Security, Featured, Global Security News, Industry Spotlight, malware, Mobile Security, Network Security, News, Preventing Misconfigurations, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threats & Breaches
CISA Mandates Federal Agencies Secure Their Cloud Environments
CISA is requiring all federal agencies to adopt stronger measures to improve their SaaS configurations and protect their complex cloud environments against growing threats from hackers, who are increasingly targeting third parties like cloud providers. The post CISA Mandates Federal Agencies Secure Their Cloud Environments appeared first on Security Boulevard.
Blog, data protection, Data Security, Global Security News, malware, Security Bloggers Network
5 Modern Computer Safety Tips You Should Know About
Protecting your computer in the hyper-connected world of today goes beyond merely preventing bothersome viruses. Smarter, quicker, and far more invasive than ever before are modern dangers. Cybercriminals no longer depend on simple strategies; they leverage flaws, fool unsuspecting consumers, […] The post 5 Modern Computer Safety Tips You Should Know About appeared first on…
APT41, Asia Pacific, backdoor, china, Cybercrime, Geopolitics, Global Security News, Government, malware, nation-state hackers, php, QiAnXin, Threats, Winnti
PHP backdoor looks to be work of Chinese-linked APT group
Cybersecurity researchers at a China-based cybersecurity company have uncovered an advanced PHP backdoor that suggests a new asset in the arsenal of Chinese-linked Advanced Persistent Threat group Winnti. Researchers at QiAnXin’s XLab discovered the backdoor, which they titled Glutton, targeting China, the United States, Cambodia, Pakistan, and South Africa. After initially discovering the malware in…
Cloud Security, Cybersecurity, data breach, Data Privacy, Data Security, deloitte, Featured, Global Security News, Identity & Access, Incident Response, Industry Spotlight, malware, Network Security, News, Ransomware, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, State Government Breach, Threat Intelligence, Threats & Breaches
Rhode Island Benefits and Services Systems Hit by Ransomware
Hackers likely stole personal information such names, addresses, and SSNs in a ransomware attack on Rhode Island’s human services systems and are threatening to release the data as state and federal officials and Deloitte scrambling to mitigate the data breach. The post Rhode Island Benefits and Services Systems Hit by Ransomware appeared first on Security…
Amnesty, Amnesty International, Cellebrite, Cybersecurity, Global IT News, Global Security News, hacking, infosec, malware, Security, Serbia, Spyware
Serbian police used Cellebrite to unlock, then plant spyware, on a journalist’s phone
Amnesty said it found NoviSpy, an Android spyware linked to Serbian intelligence, on the phones of several members of Serbian civil society following police stops. © 2024 TechCrunch. All rights reserved. For personal use only.
Cloud Security, Cybersecurity, cybersecurity professionals, Data Privacy, Data Security, Datadog, Featured, Global Security News, Identity & Access, Information stealing malware, malware, Network Security, News, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, Threat Intelligence, vulnerabilities, wordpress
Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on the dark web. The post Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors appeared first on Security Boulevard.
data breach, Data loss, Global Security News, Guest blog, Krispy Kreme, malware, North America, Ransomware
Doughnut orders disrupted! Krispy Kreme suffers hack attack
Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States. Read more in my article on the Hot for Security blog.
Global Security News, Guest blog, malware, North America, Ransomware, Russia
Ransomware-hit vodka maker Stoli files for bankruptcy in the United States
Stoli Group USA, the US subsidiary of vodka maker Stoli, has filed for bankruptcy – and a ransomware attack is at least partly to blame. The American branch of Stoli, which imports and distributes Stoli brands in the United States, as well as the Kentucky Owl bourbon brand it purchased in 2017, was hit by…
Fake anti-virus, Global Security News, Google, Google ads, Guest blog, malvertising, malware, phishing, Ransomware, Scam, seo, technical support scam
Tech support scams leverage Google ads again and again, fleecing unsuspecting internet users
It’s not a new technique, but that doesn’t mean that cybercriminals cannot make rich rewards from SEO poisoning. Read more in my article on the Tripwire State of Security blog.
@chenlun, A Little Sunshine, and Mobile Anti-Abuse Working Group, Anti-Phishing Working Group, Coalition Against Unsolicited Commercial Email, Global Security News, ICANN, Interisle Consulting, Internet Corporation for Assigned Names and Numbers, John Levine, Latest Warnings, malware, Messaging, new gTLDs, North America, phishing, spam, The Coming Storm, U.S. Postal Service
Why Phishers Love New TLDs Like .shop, .top and .xyz
Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as .shop, .top, .xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees…
data breach, Data loss, Global Security News, Guest blog, hospital, INC Ransom, malware, Ransomware
No guarantees of payday for ransomware gang that claims to have hacked children’s hospital
What is the point of INC Ransom’s attack on Alder Hey? They are not likely to be paid, and the attack on a children’s hospital only increases the chances that they will one day find their collars felt by law enforcement. Read more in my article on the Hot for Security blog.
Data loss, Global Security News, Guest blog, hospital, malware, NHS, Ransomware
UK hospital, hit by cyberattack, resorts to paper and postpones procedures
A British hospital is grappling with a major cyberattack that has crippled its IT systems and disrupted patient care. Read more in my article on the Hot for Security blog.
Conti, Exploits, Global Security News, Guest blog, malware, Ransomware, vulnerability
Mimic ransomware: what you need to know
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool (“Everything” by Voidtools) to quickly locate files for encryption. Find out more about the threat in my article on the Tripwire State of Security blog.