US charged Latvian women for involvement in development of Trickbot malware

US charged Latvian women for involvement in development of Trickbot malware

The US Department of Justice has charged a Latvian woman for allegedly being part of the infamous Trickbot Group that deployed the Trickbot malware, which infected millions of victim computers worldwide. The Trickbot Group operated in Russia, Belarus, Ukraine, and Suriname, and primarily targeted victim computers belonging to businesses, entities, and individuals. Targets…

Qantas infiltrated by organised crime: ACIC

Qantas infiltrated by organised crime: ACIC

Individuals identified include a Hells Angels-linked figure in the Northern Territory who is working as a Qantas contractor. He is the subject of intelligence indicating he previously infiltrated Defence Department flights that were subcontracted to Qantas. A Qantas freight contractor in Perth was also found by Brunello to have been repeatedly “using his trusted insider…

Exclusive: U.S. to give ransomware hacks similar priority as terrorism

Exclusive: U.S. to give ransomware hacks similar priority as terrorism

The U.S. Department of Justice is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack and mounting damage caused by cyber criminals, a senior department official told Reuters. Internal guidance sent on Thursday to U.S. attorney’s offices across the country said information about ransomware investigations…

Where’s the Beef? Ransomware Hit Highlights Cyber Problems

Where’s the Beef? Ransomware Hit Highlights Cyber Problems

Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service Disruption of Meat Processing Giant JBS Exposes Sector’s Security Shortcomings Scott Ferguson (Ferguson_Writes) • June 4, 2021     Photo: US Department of Agriculture via Flickr/CC The ransomware attack that disrupted operations at meat processing giant JBS for nearly a week has exposed numerous cybersecurity shortcomings within…

Critical RCE Bug in VMware vCenter Server Under Active Attack – KK Hack Labs

Critical RCE Bug in VMware vCenter Server Under Active Attack – KK Hack Labs

Malicious actors are actively mass scanning the internet for vulnerable VMware vCenter servers that are unpatched against a critical remote code execution flaw, which the company addressed late last month.The ongoing activity was detected by Bad Packets on June 3 and corroborated yesterday by security researcher Kevin Beaumont. “Mass scanning activity detected from 104.40.252.159 checking for

Is STG Building a New Cybersecurity Powerhouse?

Is STG Building a New Cybersecurity Powerhouse?

Cloud Security , Endpoint Security , Security Operations FireEye Acquisition Opens New Doors for Private Equity Firm Doug Olenick (DougOlenick) • June 5, 2021     Symphony Technology Group’s acquisition on Wednesday of FireEye Products Business in a $1.2 billion deal will set up the private equity group to better compete with security giants such…

Network Intrusion, Suspected Ransomware Attack at Fujifilm

Network Intrusion, Suspected Ransomware Attack at Fujifilm

Cybercrime , Cybercrime as-a-service , Fraud Management & Cybercrime Company Shut Down Part of Its Network That Was Compromised Akshaya Asokan (asokan_akshaya) • June 3, 2021     Japanese conglomerate Fujifilm has shut down part of its network after it was compromised in a suspected ransomware attack, the company said in an update on Wednesday….

CVE-2021-22322 – Alert Detail – Security Database

CVE-2021-22322 – Alert Detail – Security Database

Executive Summary Informations Name CVE-2021-22322 First vendor Publication 2021-06-03 Vendor Cve Last vendor Modification 2021-06-04 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA   Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…