Oct 26, 2024Ravie LakshmananCyber Attack / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in…

Read More

The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack. Black Basta is a ransomware operation active since April 2022 and responsible for hundreds of attacks against corporations worldwide. After the Conti cybercrime syndicate shut down in…

Read More

Russia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware and illegal circulation of means of payment. REvil ransomware (aka Sodin and Sodinokibi) was launched in April 2019 as a direct successor of the GandCrab operation. In less than a year, the gang became the most prolific ransomware group, asking…

Read More

Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files. APT29, also known as “Cozy Bear” and “Midnight Blizzard,” is a Russian state-sponsored cyber-espionage group linked to Russia’s Foreign Intelligence Service (SVR). Amazon clarifies that…

Read More

Tuan Tran is stepping down from his role as president of HP’s printing and imaging business to lead the PC and print giant’s cross-company AI strategy as the leader of a new organization. Taking over the printing business is 30-year HP veteran Anneliese Olson. HP Inc. has tapped the leader of its printing and imaging…

Read More

Gad Rosenthal Gad Rosenthal is a senior product manager at Tenable, where he leads the development of data security posture management (DSPM) capabilities. He joined Tenable after it acquired Eureka, a cloud data security company. Gad has also held cybersecurity roles at Microsoft, Siemplify (now part of Google), and Imperva, and has led cybersecurity and…

Read More

Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild. Background The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager. Update October 23: The blog has been updated with new information about in-the-wild…

Read More

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Dive into…

Read More

In today’s digital landscape, organizations face an ever-increasing number of cyber threats. To combat these challenges effectively, many businesses are turning to cloud SIEM solutions. This comprehensive guide will explore what cloud-based SIEM solutions are, their benefits, key features, and how they can streamline your threat detection processes.   What are Cloud SIEM Solutions? Security…

Read More

‘Approximately 100 million individual notices have been sent regarding this breach,’ the U.S. Department of Health and Human Services says. UnitedHealth Group disclosed that data belonging to an estimated 100 million individuals was impacted in the widely felt breach of Change Healthcare earlier this year. The insurer had already said in June it believes sensitive…

Read More