Day
00
–:–
Post Activated
Scroll down to press Like
Cybersecurity Threats:
- Computer Viruses:
- Mindware: This is a new entry in the ransomware as a service market that stands out for its double extortion technique, which involves stealing data before encrypting the victim’s files.
- Black Basta: Gained notoriety with several attacks earlier in the year and is suspected to have connections with the infamous Conti group.
- Onyx: Initially mistaken for a wiper malware due to a coding error that resulted in the destruction of files of certain sizes.
- Malware:
- Jellyfish Loader: A newly discovered sophisticated shellcode loader that is capable of collecting detailed system information and establishing secure command and control communications.
- Tambir, Dwphon, and Gigabud: These are new variants of Android malware that have been identified with capabilities ranging from credential theft to circumventing two-factor authentication.
- Ransomware:
- SYS01: Distributed through Facebook business pages and ads, this info-stealer disguises itself as counterfeit Windows themes and pirated games.
- APT Inc.: Known previously as SEXi ransomware, this threat targets VMware ESXi and Windows servers using leaked encryptors from other ransomware groups.
- DoNex: A new ransomware strain that has been actively compromising companies in the United States and Europe.
Cybersecurity Breaches:
- AT&T: Experienced a significant breach with unauthorized access and data download affecting approximately 109 million customer accounts, including sensitive call and text records.
- Rite Aid: Recently confirmed a cybersecurity incident, but has since restored and fully operationalized its systems.
- Major Data Breaches: Recent incidents have involved notable organizations such as Trello, AnyDesk, France Travail, Nissan, MITRE, Dropbox, BBC Pension Scheme, TeamViewer, Advance Auto Parts, and AT&T.
This report underscores the importance of maintaining robust cybersecurity measures and staying updated on the latest threats to safeguard against potential breaches and attacks.
