Prevent Cryptocurrency Cyber Extortion

Credit to Author: Jon Clay| Date: Thu, 22 Dec 2022 00:00:00 +0000

Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. We review cryptocurrency trends and how enterprises can enhance their cybersecurity posture to prevent cyber extortion.

Read more

BEC scammers go after more than just money

Categories: Business

Categories: News

Tags: FBI. FDA

Tags: USDA

Tags: BEC

Tags: business email compromise

Tags: domain mimicry

Tags: spear phishing

Business email compromise is not just after money alone anymore, they will take truckloads of agricultural products as well.

(Read more…)

The post BEC scammers go after more than just money appeared first on Malwarebytes Labs.

Read more

The pitfalls of blocking IP addresses

Categories: News

Tags: IP

Tags: DNS

Tags: IPv6

Tags: blocking

Tags: domains

Tags: Austria

Tags: Cloudflare

Tags: Freedom House

Using IP blocks to make domains unreachable is a far-reaching method that has undesirable side effects because there is no one-on-one relationship.

(Read more…)

The post The pitfalls of blocking IP addresses appeared first on Malwarebytes Labs.

Read more

Play ransomware group claims to have stolen hotel chain data

Categories: News

Tags: H-Hotel

Tags: Play ransomware

Tags: ransomware

Tags: extortion

Tags: threat

Tags: breach

Tags: EDR

A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if the ransom is not paid

(Read more…)

The post Play ransomware group claims to have stolen hotel chain data appeared first on Malwarebytes Labs.

Read more

Microsoft research uncovers new Zerobot capabilities

Credit to Author: Paul Oliveria| Date: Wed, 21 Dec 2022 20:00:00 +0000

The Microsoft Defender for IoT research team details information on the recent distribution of a Go-based botnet, known as Zerobot, that spreads primarily through IoT and web-application vulnerabilities.

The post Microsoft research uncovers new Zerobot capabilities appeared first on Microsoft Security Blog.

Read more