Wave of Fargo ransomware attacks hits Microsoft SQL servers
Cybersecurity experts warn of hackers exploiting and targeting vulnerabilities in Microsoft SQL servers exposed to the internet through a new wave of Fargo ransomware cyberattacks.
BleepingComputer informed users of a similar cyberattack on Microsoft SQL servers in February. Another wave occurre... Read more
FishPig discovers exploit that puts 200,000 websites at risk
200,000 sites risk having their data compromised due to an exploit in FishPig's software.
FishPig is a UK-based e-commerce software developer. Organizations use its Magento and WordPress plugins to streamline processes. FishPig recently discovered that attackers had found a backdoor into the sec... Read more
Business leaders don’t focus on cybersecurity until breached
Top management only becomes aware of cybersecurity after a significant threat occurs. A shift to a proactive approach is necessary to ensure survival in the current digital landscape.
A report from the UK Department for Culture, Media, and Sport (DCMS) that interviewed several managing partners... Read more
Luca Stealer malware spreads rapidly after code shared on forum
A rust-based malware named Luca Stealer spread rapidly after its source code was published on a cybercrime forum.
The data-stealing malware is programmed in Rust. Dubbed 'Luca Stealer', the malware was first shared at the beginning of July. The developer posted the code on a cybercrime forum and... Read more
‘Lapsus$ is masterminded by 16-year-old Brit’
Reportedly, Lapsus$ is led by a 16-year-old British male. The criminal group recently managed to penetrate Microsoft, Nvidia, Okta and Samsung.
Bloomberg writes that cybersecurity experts acting on behalf of affected organizations traced the attacks to a 16-year-old British male. The teenager re... Read more
IKEA’s email system riddled with cyberattacks
IKEA has recently been tackling phishing attacks towards its employees. The attacker uses stolen reply-chain emails to lure employees into a false sense of security and click malicious links.
Cyberattacks are becoming an everyday occurrence, and organizations worldwide are falling prey to meticu... Read more
Cybercriminals enhance tactics to exploit zero-day flaws
HP Wolf Security caught exploits of the zero-day CVE-2021-40444 a remote code execution vulnerability in the MSHTML browser engine that can be triggered by opening a malicious Microsoft Office document.
The flaw was caught a week before a patch was released for it. The latest HP Wolf Security Th... Read more
Fujitsu confirms stolen data was not taken from its systems
Fujitsu confirmed that data being sold by cybercriminals is not related to any breaches or attacks on its systems. Last month, a claim appeared on Marketo (the criminal marketplace) selling 4GB of data from Fujitsu, which was marketed widely.
At the time, Fujitsu said it was investigating a pote... Read more
This is the perfect ransomware victim, in the eyes of cybercriminals
KELA published a report on Monday detailing the listings made by ransomware operators in the underground. It includes initial access requests (how the attackers gain a foothold in the target system to spread).
The report reveals that many hackers want to buy access to US companies that bring in ... Read more
Enterprises have to deal with more one-two-punch extortionists
During this year’s Black Hat USA event, experts have warned that the adoption of double-extortion attacks against organizations is on a rising trend. The warning comes after this year saw Kaseya, JBS, and Colonial Pipeline, among the most affected companies targeted by cybercriminals.
Ransomwa... Read more