Security News

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors
2023-07-05 14:10

The malware "Possesses the ability to steal information from various browsers, enabling the exfiltration of sensitive data, while also incorporating different modules for carrying out ransomware activities," Zscaler researchers Shatak Jain and Gurkirat Singh said in a recent analysis. Following a successful breach, the malicious binary is used as a conduit to set up persistence, perform the actual browser update, and also drop a stealer capable of covertly harvesting sensitive information and encrypting the stolen files, leaving the victims at risk of potential data loss, exposure, or even the sale of their valuable data.

Small organizations face security threats on a limited budget
2023-07-05 03:00

Small organizations face the same security threats as organizations overall but have less resources to address them, according to Netwrix. Smaller organizations usually have fewer resources and experience with which to address security threats.

Undiplomatic Chinese threat actor attacks embassies and foreign affairs departments
2023-07-04 05:29

Infosec outfit Checkpoint says it's spotted a Chinese actor targeting diplomatic facilities around Europe. Checkpoint has dubbed the campaign "SmugX" thanks to its use of HTML smuggling to deploy the PlugX remote access trojan.

Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023
2023-06-29 19:40

A new report from Kaspersky reveals the top cyber threats for SMBs in 2023. The biggest cybersecurity threat to SMBs is the use of exploits by attackers; there were 483,980 detections in the five first months of 2023.

Popular generative AI projects pose serious security threat
2023-06-29 04:30

Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, resulting in an environment with substantial risk for organizations, according to Rezilion. "On top of their inherent security issues, individuals and organizations provide these AI models with excessive access and authorization without proper security guardrails. Through our research, we aimed to convey that the open-source projects that utilize insecure generative AI and LLMs have poor security posture as well. These factors result in an environment with significant risk for organizations."

Inside Threat Actors: Dark Web Forums vs. Illicit Telegram Communities
2023-06-26 14:05

In this post, we're going to explore common threat actors and their activities on dark web forums versus illicit Telegram communities. Hackers on dark web forums are more commonly known to share more zero-day exploits to other threat actors as well as share with other hackers how to use these exploits to their advantage as well.

Exploring the persistent threat of cyberattacks on healthcare
2023-06-26 04:30

In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patients' personal data and medical devices. Could you elaborate on the long-term impacts of significant cyberattacks on healthcare institutions?

Unraveling the multifaceted threats facing telecom companies
2023-06-22 03:30

From DDoS attacks to sophisticated spyware infiltration, telecom providers face a wide range of threats that can disrupt services, compromise data, and compromise subscriber privacy. What are some common attack vectors that target telecom companies, their third-party providers, or the subscribers of a telecom service and how equipped are telecom providers to deal with this type of attacks?

Introducing the book: Visual Threat Intelligence
2023-06-16 04:00

In this Help Net Security video interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses his new book – Visual Threat Intelligence. The book covers a wide range of topics,...

DDoS threats and defense: How certain assumptions can lead to an attack
2023-06-13 14:18

You can book a DDoS attack on one of countless shady platforms, and then you don't even have to deal with the technology yourself. No matter what, a company's protective measures should always be kept up to date, and you should always question yourself about how well-prepared you are against a DDoS attack - or face severe consequences if you are caught unprepared.