Mon.Jun 07, 2021

Identity Theft: Impact on Victims Is Getting Worse

Data Breach Today

ITRC's Eva Velasquez on Reducing ID Fraud and Increasing Victim Resources The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.

196
196

Justice Dept. Claws Back $2.3M Paid by Colonial Pipeline to Ransomware Gang

Krebs on Security

The U.S. Department of Justice said today it has recovered $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists last month.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hospital Pays Ransom in Exchange for Promised Data Destruction

Data Breach Today

Decision to Pay Highlights Healthcare Sector Challenges The recent decision by a Massachusetts-based hospital to pay a ransom in exchange for promises by the attackers to destroy stolen data spotlights the difficult choices many healthcare entities face in the wake of cyberattacks

196
196

Adventures in Contacting the Russian FSB

Krebs on Security

KrebsOnSecurity recently had occasion to contact the Russian Federal Security Service (FSB), the Russian equivalent of the U.S. Federal Bureau of Investigation (FBI).

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Siloscape Malware Reportedly Targeting Windows Containers

Data Breach Today

Malware Capable of Compromising Kubernetes Clusters, Researchers Say Researchers believe that a malware variant that specifically targets poorly protected or misconfigured Windows containers has been uncovered for the first time, according to a report published by Palo Alto Networks' Unit 42.

185
185

More Trending

$2.3 Million of Colonial Pipeline Ransom Payment Recovered

Data Breach Today

Justice Department Tracked the Payment to an FBI-Controlled Bitcoin Wallet The U.S. Justice Department reported it recouped $2.3 million of the $4.4 million ransom Colonial Pipeline Co. paid following a May 7 ransomware attack.

Ransomware Hit Another Pipeline Firm—and 70GB of Data Leaked

WIRED Threat Level

LineStar Integrity Services was hacked around the same time as Colonial Pipeline, but radical transparency activists have brought the attack to light. Security Security / Security News

Evil by a Different Name: Crime Gang Rebrands Ransomware

Data Breach Today

WastedLocker Ransomware From Evil Corp Disguised as PayloadBin to Avoid Sanctions If you're a Russian cybercrime gang feeling the heat after being sanctioned by the U.S. government, why not rebrand?

RockYou2021: largest password compilation of all time leaked online with 8.4 billion entries

Security Affairs

RockYou2021, the largest password compilation of all time has been leaked on a popular hacker forum, it contains 8.4 billion entries of passwords. . Original post at: [link]. What seems to be the largest password collection of all time has been leaked on a popular hacker forum.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Cobalt Gang Members Sentenced by Kazakhstan District Court

Data Breach Today

Money Mule Convictions Unlikely to Slow Gang Activity A district court in Kazakhstan sentenced two unidentified Cobalt, aka Carbanak, gang members to serve eight years in prison on robbery and attempted robbery charges.

147
147

Russian cybercrime forums launch contests for cryptocurrency hacks

Security Affairs

Cybercriminals in Russian underground forums have been invited to take part in competitions for hacking cryptocurrency and NFT. Several Russian underground forums have launched competitions for hacking cryptocurrency schema and Non-fungible token (NFT).

Paper 78

US Prosecutors Charge Latvian Woman in Trickbot Gang Case

Data Breach Today

Case Is First Test for DOJ's Ransomware and Digital Extortion Task Force U.S. Justice Department prosecutors have charged a 55-year-old Latvian woman with helping to develop code for the Trickbot gang as well as stealing banking credentials and deploying ransomware, according to a federal indictment.

Welcoming the Uruguayan Government to Have I Been Pwned

Troy Hunt

This week as part of the ongoing initiative to make breach data available to national governments, I'm very happy to welcome the national CERT of Uruguay, CERTuy.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'

Data Breach Today

Windows Container Malware Targets Kubernetes Clusters

Threatpost

“Siloscape”, the first malware to target Windows containers, breaks out of Kubernetes clusters to plant backdoors and raid nodes for credentials. Cloud Security Vulnerabilities Web Security

Cloud 107

How Can I Test the Security of My Home-Office Employees' Routers?

Dark Reading

From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk

Risk 65

Providing a superior experience for commercial banking customers

OpenText Information Management

The banking industry—which includes retail banks and credit unions, wealth and asset management firms, and corporate and treasury divisions—faces severe challenges.

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Latvian Woman Charged for Role In Crafting Trickbot Malware

Dark Reading

Alla Witte and her associates are accused of using Trickbot to infect tens of millions of computers around the world, the Justice Department reports

63

Siloscape, first known malware that drops a backdoor into Kubernetes clusters

Security Affairs

Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and spread in the Kubernetes cluster.

Cloud 61

First Known Malware Surfaces Targeting Windows Containers

Dark Reading

Siloscape is designed to create a backdoor in Kubernetes clusters to run malicious containers

62

Top 5 differences between information assurance vs. cybersecurity

OpenText Information Management

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these terms are used interchangeably but there are key differences between the two.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

DoJ Seizes $2.3M in Bitcoin Paid to Colonial Pipeline Attackers

Dark Reading

The amount allegedly represents a May 8 payment to the DarkSide ransomware group

Top 5 differences between information assurance vs. cybersecurity

OpenText Information Management

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these terms are used interchangeably but there are key differences between the two.

NortonLifeLock Criticized for New Cryptomining Feature

Dark Reading

While the crypto crowd applauds the move, critics worry about the environmental impact, supporting a currency used for ransomware, and mining further slowing down systems

Better patient outcomes happen when you look beyond EMRs

OpenText Information Management

A patient is more than their symptoms and more than their medical records. Keeping that larger, human perspective in mind can deliver better outcomes. Some of the most promising opportunities in healthcare today come from using non-clinical data to improve patient engagement and outcomes.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Cartoon Caption Winner: Road Trip

Dark Reading

And the winner of Dark Reading's cartoon caption contest is

59

Bad Apple: App Store Rife with Fraud, Fleeceware

Threatpost

Malicious apps make up 2 percent of top grossing apps in Apple App Store. Malware Mobile Security

CISA Warns Criminals Seek to Exploit Critical VMware Bug

Dark Reading

Organizations running vCenter Server and VMware Cloud Foundation are urged to apply fixes deployed on May 25

Cloud 58