Sun.Jun 11, 2023

article thumbnail

US DOJ Charges 2 Russian Nationals With Mt. Gox Hack

Data Breach Today

Mt. Gox Proceeds Used to Found BTC-e, Prosecutors Say U.S. federal prosecutors accused two Russian nationals of carrying out the heist that provoked the 2014 collapse of cryptocurrency trading exchange Mt. Gox, then the world's largest crypto platform. One of them used the proceeds to co-found BTC-e, a now-shuttered crypto money laundering platform.

130
130
article thumbnail

Microsoft warns of multi-stage AiTM phishing and BEC attacks

Security Affairs

Microsoft researchers warn of banking adversary-in-the-middle (AitM) phishing and BEC attacks targeting banking and financial organizations. Microsoft discovered multi-stage adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attacks against banking and financial services organizations. In AiTM phishing, threat actors set up a proxy server between a target user and the website the user wishes to visit, which is the phishing site under the control of the attackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How NK's Cyber Criminals Stole 3 Billion in Crypto To Fund Their Nukes

KnowBe4

The Wall Street Journal today revealed that North Korea's hacker army managed to steal a huge amount of cryptocurrency amounting to $3 billion to finance their nuclear program. US officials have confirmed this news.

92
article thumbnail

Security Affairs newsletter Round 423 by Pierluigi Paganini – International edition

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Experts found new MOVEit Transfer SQL Injection flaws The University of Manchester suffered a cyber attack and suspects a data breach Russians charged with hacking Mt.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Thales Partners with Google Cloud to Build New, Generative-AI Powered Security Features

Thales Cloud Protection & Licensing

Thales Partners with Google Cloud to Build New, Generative-AI Powered Security Features madhav Mon, 06/12/2023 - 05:05 The past year has seen a stratospheric improvement in artificial intelligence (AI) technology. The launch of the first AI chatbot tool in December 2022 saw AI transformed from a niche, quasi-dystopian sci-fi trope to one of the most talked about topics on the planet.

Cloud 62
article thumbnail

Pro-Ukraine Cyber Anarchy Squad claims the hack of the Russian telecom provider Infotel JSC

Security Affairs

Pro-Ukraine hackers Cyber Anarchy Squad claimed responsibility for the attack that hit Russian telecom provider Infotel JSC. Pro-Ukraine hacking group Cyber.Anarchy.Squad claimed responsibility for an attack on Russian telecom provider Infotel JSC. The company provides connectivity services to the Russian banking system, for this reason, the attack had a severe impact on the operations of major banks in the country.