eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices
eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices
A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information.Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers…
Cybercrime , Cybercrime as-a-service , DDoS Protection Matthew Gatrel Offered Subscription-Based Computer Attack Platforms Prajeet Nair (@prajeetspeaks) • September 19, 2021 An Illinois man has been found guilty of running subscription-based distributed denial of service attacks that flood targeted computers with information and prevent them from being able to access the internet, reports…
Defense CMMC board adds new training head, board members By Lauren C. Williams May 16, 2021 The governing body for the Defense Department’s unified cybersecurity standard has a new training lead. Melanie Kyle Gingrich will take over training daily operations for the Cybersecurity Maturity Model Certification Accreditation Body as the vice president…
Breach Notification , Cyberwarfare / Nation-State Attacks , Email Security & Protection Microsoft Investigating; Devcore Pentesters Say They’re in the Clear Jeremy Kirk (jeremy_kirk) • March 14, 2021 It has been an open question as to how a half-dozen hacking groups began exploiting Exchange servers in an automated fashion in the days leading…
During the last decade, lots of business owners have talked about cloud migration and transformation, as well as cloud security. With Gartner’s most recent forecast of an 18.4% increase in worldwide public spending on cloud services in 2021, totaling almost $305 billion, it is clear this trend is only heading upward. But what are the…
Apple AirTag, the Bluetooth tracker that was unveiled last month to let people find their lost items, is claimed to have some security loopholes that could allow hackers to modify its firmware. A security researcher has demonstrated the loopholes by hacking the AirTag using reverse engineering. The researcher claimed on Twitter that he was able…