Threats

Merdoor Malware Detection: Lancefly APT Uses a Stealthy Backdoor in Long-Running Attacks Against Organizations in South and Southeast Asia

A novel hacking collective tracked as Lacefly APT has been recently observed applying a custom Merdoor backdoor to attack organizations in the government, telecom, and aviation sectors across South and Southeastern Asia. According to the latest reports, these targeted intrusions point to a long-running adversary campaign leveraging Merdoor sample, with the first traces dating back […]

The post Merdoor Malware Detection: Lancefly APT Uses a Stealthy Backdoor in Long-Running Attacks Against Organizations in South and Southeast Asia appeared first on SOC Prime.

Cybersecurity Tools

What Is a Brute Force Attack? Definition, Prevention and Examples

Cyber criminals have many sophisticated techniques to hack people’s devices and steal their login credentials, but one of their most successful methods is also their simplest: brute force. In this blog, we explain how brute force attacks work, why they differ from methods such as phishing and malware, and the ways organisations can prevent intrusions. What is a brute force attack? A brute force attack is a method of criminal hacking that involves breaking into a system by guessing usernames and passwords. Fraudsters do this through trial and error. They know that many people use commonly used passwords, so it

The post What Is a Brute Force Attack? Definition, Prevention and Examples appeared first on IT Governance UK Blog.

Cybersecurity Tools

UNC3944 Uses Azure Serial Console for Stealthy Access to Virtual Machines

Researchers revealed that the UNC3944 threat actors use phishing and SIM-swapping attacks to get control over Microsoft Azure admin accounts. Hackers maliciously used the Azure Serial Console on Azure Virtual Machines (VM) to deploy remote management software within client environments. The method succeeded to avoid the usual detection methods that Azure uses and enabled threat […]

The post UNC3944 Uses Azure Serial Console for Stealthy Access to Virtual Machines appeared first on Heimdal Security Blog.

News & Updates

US Department of Justice Offers $10 Million Bounty for Alleged Russian Ransomware Mastermind

The US Department of Justice (DoJ) recently announced a $10 million reward for
information leading to the arrest of alleged Russian ransomware mastermind
Mikhail Pavlovich Matveev.

Acting under the moniker ‘Wazawaka,’ the suspect is accused of orchestrating
high-profile cyberattacks against critical infrastructure such as law
enforcement bodies, government agencies, hospitals and schools.

The alleged hacker is accused of demanding approximately $400 million from his
victims, half of which was

News & Updates

Security breaches push digital trust to the fore

As digital transactions with customers, employees, suppliers, and other stakeholders grow, digital trustworthiness is set to become one of the most important enterprise-wide initiatives with the biggest potential impact (both negative and positive), even though it often has the smallest budget allocation.

“Organizations are focusing on security and privacy, but if your customers don’t trust you, they will go elsewhere,” says Mark Thomas president of Escoute Consulting, which specializes in compliance. This view is borne out in a 2022 DigiCert digital trust survey that found 84% of customers would consider switching if they lost trust in a company.

To read this article in full, please click here

Cybersecurity Tools

Capita Recommends Its Customers to Assume Their Data Was Stolen

At the end of March, a cyberattack affected Capita’s systems, resulting in the theft of customer data. Six weeks after the attack was revealed, Capita warned Universities Superannuation Scheme (USS), the largest private pension scheme in the UK, to assume that their members’ data was stolen. The USS manages the pensions of over 500,000 UK […]

The post Capita Recommends Its Customers to Assume Their Data Was Stolen appeared first on Heimdal Security Blog.

News & Updates

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered

Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China.
This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in a joint report shared with The Hacker News.
“The identified phishing
News & Updates

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator

A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against “thousands of victims” in the country and across the world.
Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a “central figure” in the development and deployment of LockBit, Babuk,
Exit mobile version