Remove Blockchain Remove Cybersecurity Remove Government Remove Manufacturing
article thumbnail

US offers $10 million reward for info on Hive ransomware group leaders

Security Affairs

Government offers rewards of up to $10 million for information that could help locate, identify, or arrest members of the Hive ransomware group. cybersecurity and intelligence authorities in January. The group used various attack methods, including malspam campaigns, vulnerable RDP servers, and compromised VPN credentials.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

A major focus of cybersecurity as an industry is its efforts to detect, root out, and respond to potential fraudsters attempting to trick companies and people out of their money, data, or both. This made a lot of sense, especially in the earlier days of the Internet where cybersecurity measures were nowhere near as robust as they are today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

French authorities arrested a Russian national for his role in the Hive ransomware operation

Security Affairs

cybersecurity and intelligence authorities. According to a report published by blockchain analytics company Chainalysis, the Hive operation is one of the top 10 ransomware strains by revenue in 2021. The international operation was conducted with the cooperation of Europol and Eurojust.

article thumbnail

Hive Ransomware Tor leak site apparently seized by law enforcement

Security Affairs

cybersecurity and intelligence authorities. According to a report published by blockchain analytics company Chainalysis, the Hive ransomware is one of the top 10 ransomware strains by revenue in 2021. The group used various attack methods, including malspam campaigns, vulnerable RDP servers, and compromised VPN credentials.

article thumbnail

The Orion blockchain database: Empowering multi-party data governance

IBM Big Data Hub

Blockchain databases were designed to enhance trust in centralized ecosystems by incorporating tamper-evidence features into traditional databases. However, existing blockchain databases lack efficient tools for multiple parties to control shared data on the ledger.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

The threats that are notable for the Asian region are represented by a significant number of attacks aimed at manufacturing of chips, microprocessors and system control boards of different IT vendors, whose principal manufacturing operations are located in Asia. Attacks on banks and their clients .

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Threats to cryptography are generally prevented by using common cybersecurity hygiene practices defined in clear and achievable governance. to initiate malicious transactions on long term blockchains or distributed ledgers.

Risk 87