Most vulnerabilities associated with ransomware are old

Researchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking a 19% increase year-over-year. Threat actors are actively searching the internet and deep and dark web for …

Red Team vs Blue Team vs Purple Team: Differences Explained

Red, blue and purple teams simulate cyberattacks and incident responses to test an organization’s cybersecurity readiness. Understanding how these teams operate is important for an organization that wants to test its cybersecurity defenses realistically — before an adversary does. The ultimate goal is to understand the advanced threats an organization may face in order to […]

The post Red Team vs Blue Team vs Purple Team: Differences Explained appeared first on eSecurityPlanet.

HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting

As of October 2022, The HardBit ransomware attack was first detected as a threat extorting cryptocurrency payments to decrypt data from organizations. Recently, version 2.0 of HardBit ransomware has been released by its operators.  It is believed that …

HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost

Recently emerged HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost. The HardBit ransomware group first appeared on the threat landscape in October 2022, but unlike other ransomware operations, it doesn’t use a double extortion model at this time. The gang threatens victims of further attacks if their ransom […]

The post HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost appeared first on Security Affairs.

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether…
The post Your Office Document is at Risk – XLL, A New Attack Vector appeared first on Quick Heal Blog | Late…

Stealc, a new advanced infostealer appears in the threat landscape

Researchers spotted a new information stealer, called Stealc, which supports a wide set of stealing capabilities. In January 2023, researchers at SEKOIA.IO discovered a new information stealer, dubbed Stealc, which was advertised in the dark web forums. The malware was developed by a threat actor that uses the moniker Plymouth who claims the info-stealer supports a […]

The post Stealc, a new advanced infostealer appears in the threat landscape appeared first on Security Affairs.

Samsung announces Message Guard feature to neutralize zero-click attacks

Samsung introduces a new protection feature called Message Guard to protect users from zero-click malware attacks. Samsung announced the implementation of a new security feature called Message Guard that aims at protecting users from malicious code that can be installed via zero-click attacks. Zero-click exploits allow attackers to compromise the target device without any user interaction, for example, a […]

The post Samsung announces Message Guard feature to neutralize zero-click attacks appeared first on Security Affairs.

Will ChatGPT start writing killer malware?

AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
The post Will ChatGPT start writing killer malware? appeared first on WeLiveSecurity

Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto

The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company. The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company, and is threatening to leak the stolen data. Aguas do Porto is a municipal water utility company that manages the full […]

The post Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto appeared first on Security Affairs.

GoDaddy admits to another data breach as hackers install malware

The website servers of GoDaddy were the latest victim of a hacking attack. Threat actors obtained access to the company’s servers and installed malware. The malware was used to trigger intermittent redirections on the customer’s website. Go…