Cyber attack hits State Department in ‘possible serious breach’

Tap here to add The Western Journal to your home screen.
The dark web page belonging to the DarkSide hacking group is down, as Bloomberg states. The Russian ransomware group is accused of attacking Colonial Pipeline. DarkSide was identified by the FBI and cybersecurity experts as the group responsible for the Colonial attack, that forced the company to shut down operations, causing fuel shortages in…
Application Security , Critical Infrastructure Security , Cybercrime Security Agency Will Use Bugcrowd, EnDyna for Platform Scott Ferguson (Ferguson_Writes) • June 8, 2021 The U.S. Cybersecurity and Infrastructure Security Agency is preparing to expand its vulnerability research and disclosure program, which is now mandatory for nearly all executive branch agencies within the federal…
A North Korean government-backed campaign targeting cybersecurity researchers with malware has re-emerged with new tactics in their arsenal as part of a fresh social engineering attack. In an update shared on Wednesday, Google’s Threat Analysis Group said the attackers behind the operation set up a fake security company called SecuriElite and a slew of social…
CopperStealer Malware Attacks Facebook and Instagram Business Accounts | IT Security News 23. March 2021 The cybersecurity researchers at Proofpoint have recently issued all the details regarding a new undocumented malware, which is dubbed as “CopperStealer.” According to the report, the threat actors are spreading this undocumented malware via fake software that continuously destroying the…
Endpoint Protection Platforms (EPP) , Endpoint Security Automatic Translation Bypasses Security Restrictions Prajeet Nair (@prajeetspeaks) • June 29, 2021 Microsoft recently released updates for the Edge browser, including a fix for a bypass vulnerability that could allow a remote attacker to bypass implemented security restrictions. See Also: Live Panel | Zero Trusts Given-…
In today’s world, it’s important to be aware of the dangers of cyber attacks. With so much of our lives being lived online, it’s only a matter of time before someone tries to take advantage of that. That’s why, in this blog post, we’re going to be talking about cyber attacks. We’ll cover everything from…