Dial 311 for… cybersecurity emergencies?

Credit to Author: Malwarebytes Labs| Date: Thu, 23 Jun 2022 15:51:59 +0000

Cybersecurity experts want a hotline for SMBs to further encourage cyber incident reporting, especially those involving ransomware attacks.

The post Dial 311 for… cybersecurity emergencies? appeared first on Malwarebytes Labs.

Read more

Karakurt extortion group: Threat profile

Credit to Author: Jovi Umawing| Date: Tue, 14 Jun 2022 16:00:29 +0000

An obscure group called Karakurt has extorted organizations in the US and elsewhere. Know how to keep it away from your network.

The post Karakurt extortion group: Threat profile appeared first on Malwarebytes Labs.

Read more

VMWare vulnerabilities are actively being exploited, CISA warns

Credit to Author: Pieter Arntz| Date: Thu, 19 May 2022 12:42:13 +0000

CISA has issued severe warnings about disclosed vulnerabilities in VMWare products that are actively being exploited, probably by APT threat actors.

The post VMWare vulnerabilities are actively being exploited, CISA warns appeared first on Malwarebytes Labs.

Read more

Cyberattacks on SATCOM networks attributed to Russian threat actors

Credit to Author: Pieter Arntz| Date: Thu, 12 May 2022 13:22:00 +0000

CISA and the FBI are sharing information about the US attribution of cyberattacks on SATCOM networks that targeted Ukraine but spilled over into other European countries.

The post Cyberattacks on SATCOM networks attributed to Russian threat actors appeared first on Malwarebytes Labs.

Read more

The top 5 most routinely exploited vulnerabilities of 2021

Credit to Author: Pieter Arntz| Date: Fri, 29 Apr 2022 16:28:20 +0000

International cybersecurity authorities have published an overview of the most routinely exploited vulnerabilities of 2021.

The post The top 5 most routinely exploited vulnerabilities of 2021 appeared first on Malwarebytes Labs.

Read more

The Original APT: Advanced Persistent Teenagers

Credit to Author: BrianKrebs| Date: Wed, 06 Apr 2022 17:55:38 +0000

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world’s biggest corporations on edge.

Read more

CISA advises D-Link users to take vulnerable routers offline

Credit to Author: Pieter Arntz| Date: Tue, 05 Apr 2022 13:23:12 +0000

CISA has advised users to take certain vulnerable D-Link routers offline since the existing vulnerabilities are know to be actively exploited and the models have reached EOL and will not get patched.

The post CISA advises D-Link users to take vulnerable routers offline appeared first on Malwarebytes Labs.

Read more

Satellites are critical infrastructure and need to be cybersecured

Credit to Author: Pieter Arntz| Date: Tue, 29 Mar 2022 10:27:03 +0000

Satellites have become a main link in communications, and given some recent events it has become clear why we consider them to be critical infrastructure.

The post Satellites are critical infrastructure and need to be cybersecured appeared first on Malwarebytes Labs.

Read more

White House urges US businesses: Protect against potential Russian cyberattacks

Credit to Author: Jovi Umawing| Date: Wed, 23 Mar 2022 16:56:08 +0000

The US Administration has yet again called out business leaders to strengthen their defenses against a cyberattack from Russia.

The post White House urges US businesses: Protect against potential Russian cyberattacks appeared first on Malwarebytes Labs.

Read more