Researchers dissect an email from an attacker asking people to help install ransomware on their company’s network for a cut of the profit. But while this campaign isn’t very successful, it shows how appealing ransomware has become.
Ransomware is one of the biggest cybersecurity threats to businesses today, and cyber criminals can potentially make millions of dollars in Bitcoin for a single successful attack.
This lure of quickly making large sums of money is attracting interest from across the cyber-criminal spectrum, from sophisticated gangs specialising in ransomware attacks, to affiliate schemes where wannabe ransomware kingpins can lease out ransomware as a service in exchange for a cut of the profits.
Threat Actors Hacked U.S. Census Bureau in 2020 by Exploiting a Citrix Flaw
Threat actors breached the servers of US Census Bureau on January 11, 2020, exploiting an unpatched Citrix ADC zero-day vulnerability, OIG revealed.
A report published by the US Office of Inspector General (OIG) revealed that threat actors breached the servers of US Census Bureau on January 11, 2020, exploiting an unpatched Citrix ADC zero-day flaw.
The servers were used to provide the Bureau with remote-access capabilities for its enterprise staff to access the production, development, and lab networks. The report states that the servers did not provide access to 2020 decennial census networks, this means that the attacker did not interfere with the results of the census.
Top 7 AWS Security Vulnerabilities Based on Real-World Tests
Imagine you ordered a security assessment of your AWS infrastructure, hoping that the report would be juicy in wicked hacking techniques. However, the document starts with things like “Lack of MFA for users” or “Lack of Log File Validation”. These security misconfigurations might sound a little disappointing right? Let me show you why these findings could be a real threat or even a business killer in some cases.
The PrintNightmare Continues: Another Zero-Day in Print Spooler Awaits Patch (CVE-2021-36958)
Microsoft continues to work on securing Windows Print Spooler after several vulnerabilities have been disclosed. One remains unpatched, despite new limitations on Point and Print functionality. The PrintNightmare Continues: Another Zero-Day in Print Spooler Awaits Patch (CVE-2021-36958)
Over the last few months, Microsoft has been reckoning with a series of vulnerabilities in the Windows Print Spooler, a service that provides printer functionality on domain controllers — where it is enabled by default — desktops and servers.
Citizen Lab Finds Apple’s China Censorship Process Bleeds Into Hong Kong and Taiwan
Despite Apple not having any legal obligation to perform political censorship in Taiwan, it has done so anyway.
Apple’s application of filters for blocking content in China has seeped into how it operates in Hong Kong and Taiwan, according to Citizen Lab researchers.
According to research performed by Citizen Lab, Apple’s application of filters, which pertain to derogatory, racist, sexual, and sometimes political content, censor more than what is required by a certain region’s moderation regulations.
Data Breach From Contact Tracing Survey ‘Low Risk’ to Hoosier Privacy, 750,000 Affected
The Indiana Department of Health announced Tuesday it is notifying nearly 750,000 Hoosiers that data from the state’s COVID-19 online contact tracing survey was improperly accessed back in July.
The data included name, address, email, gender, ethnicity and race, and date of birth.
U.S. Hospitals Divert Care After Cyber-Attack
A cyber-attack forced hospitals in West Virginia and Ohio to divert patients to other care providers and work from paper records.
Threat actors targeted Memorial Health System with ransomware on the morning of August 15. The assault disrupted the IT systems at nearly all the health system’s 64 clinics and three hospitals – Marietta Memorial, Selby General, and Sistersville General.
More Cyber Security News at https://QUE.com/tag/cybersecurity