https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 14:07:272024-08-30 14:07:27Russian APT29 Using NSO Group-Style Exploits in Attacks, Google
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism.
The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s equipped to
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 14:07:272024-08-30 14:07:27Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign
Over the last few years, ransomware attacks have become a major concern for schools and colleges in the US, with an average of $500,000 being lost per day due to downtime from these attacks, according to Comparitech.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 13:06:422024-08-30 13:06:42Report: Ransomware Attacks on US Schools and Colleges Cost $9.45 Billion
Key aspects of the NIS2 Directive include a focus on proactive cybersecurity measures for entities within its scope, such as risk analysis, incident handling, and supply chain security.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 12:07:402024-08-30 12:07:40The NIS2 Directive: How Far Does it Reach?
Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns.
Recorded Future’s Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm (formerly
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 12:07:402024-08-30 12:07:40Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 12:07:392024-08-30 12:07:39BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 12:07:392024-08-30 12:07:39California Advances Landmark Legislation to Regulate Large AI Models
Grove Group, a cybersecurity and cloud services company based in Cape Town, brings around 600 customers across 51 countries to Integrity360. This acquisition will also enhance Integrity360’s security operations center (SOC) business.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-30 12:07:382024-08-30 12:07:38Integrity360 Expands to South Africa with Grove Acquisition
Noteworthy stories that might have slipped under the radar: automotive CTF with $100k in prizes, deepfake scams, and Singapore’s OT security masterplan for 2024.
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Russian APT29 Using NSO Group-Style Exploits in Attacks, Google
/in General NewsGoogle’s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign
/in General NewsCybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism.
The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s equipped to
The Hacker News – Read More
Report: Ransomware Attacks on US Schools and Colleges Cost $9.45 Billion
/in General NewsOver the last few years, ransomware attacks have become a major concern for schools and colleges in the US, with an average of $500,000 being lost per day due to downtime from these attacks, according to Comparitech.
Cyware News – Latest Cyber News – Read More
The NIS2 Directive: How Far Does it Reach?
/in General NewsKey aspects of the NIS2 Directive include a focus on proactive cybersecurity measures for entities within its scope, such as risk analysis, incident handling, and supply chain security.
Cyware News – Latest Cyber News – Read More
Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
/in General NewsCybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns.
Recorded Future’s Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm (formerly
The Hacker News – Read More
BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests
/in General NewsCisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs.
The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first on SecurityWeek.
SecurityWeek – Read More
California Advances Landmark Legislation to Regulate Large AI Models
/in General NewsEfforts in California to establish first-in-the-nation safety measures for the largest artificial intelligence systems cleared an important vote.
The post California Advances Landmark Legislation to Regulate Large AI Models appeared first on SecurityWeek.
SecurityWeek – Read More
Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers
/in General NewsA year-long malware campaign targets Roblox developers using fake NPM packages mimicking “noblox.js” to steal data. Despite takedowns,…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Integrity360 Expands to South Africa with Grove Acquisition
/in General NewsGrove Group, a cybersecurity and cloud services company based in Cape Town, brings around 600 customers across 51 countries to Integrity360. This acquisition will also enhance Integrity360’s security operations center (SOC) business.
Cyware News – Latest Cyber News – Read More
In Other News: Automotive CTF, Deepfake Scams, Singapore’s OT Security Masterplan
/in General NewsNoteworthy stories that might have slipped under the radar: automotive CTF with $100k in prizes, deepfake scams, and Singapore’s OT security masterplan for 2024.
The post In Other News: Automotive CTF, Deepfake Scams, Singapore’s OT Security Masterplan appeared first on SecurityWeek.
SecurityWeek – Read More