The attackers also use custom wipers to cover their tracks and bypass EDR.
Read moreIdentity Alone Won’t Save Us: The TSA Paradigm and MGM’s Hack
November 7 2023To combat sophisticated threats, we need to improve how we approach authorization and access controls.
Read moreSpaf on the Morris Worm
November 7 2023Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—thirty-five years ago. His lessons from then are still applicable today.
Read moreMandiant/Google Cloud’s Jill C. Tyson offers up timelines, checklists, and other guidance around enterprise-wide readiness to ensure compliance with the new rule.
Read moreKinsing Cyberattackers Debut ‘Looney Tunables’ Cloud Exploits
November 7 2023Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
Read morePreviously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise "GootBot" attack, each implant with its own C2.
Read moreVirtual Kidnapping: AI Tools Are Enabling IRL Extortion Scams
November 7 2023With AI and publicly available data, cybercriminals have the resources they need to fake a real-life kidnapping and make you believe it.
Read moreNovel Google Cloud RAT Uses Calendar Events for C2
November 7 2023Cybercriminals are abusing legitimate functions within cloud services, and providers can't totally stop them, especially when it comes to innovative approaches like this.
Read more
Recent Comments