More evidence suggests that DarkSide and BlackMatter are the same group

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that after the clamorous Colonia Pipeline attack, the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. The experts analyzed encryption algorithms in a decryptor used by BlackMatter, which is actively attacking corporate entities. […]

New cybersecurity initiative by Homeland Security, NIST to protect critical infrastructure community

U.S. President Joe Biden has set up a voluntary industrial control systems (ICS) initiative that envisages collaboration between the federal government and the critical infrastructure community to significantly improve the security of the critical systems. The White House has also signed a national security memorandum that will enhance security for critical infrastructure control systems, focused […]

Ransom demands are getting larger and larger

Demands have tripled in the last year alone. (Image credit: Image Credit: WK1003Mike / Shutterstock ) In the past twelve months, ransom demands made by cybercriminal groups have tripled, according to a new report from ransomware protection firm ProLion. The company recently analyzed data from 50,000 of its policyholders in North America and found the […]

Phishing attacks hit a huge number of businesses last year

As remote working continues, phishing is becoming increasingly lucrative. (Image credit: Image Credit: wk1003mike / Shutterstock) In the past year, almost three-quarters (73 percent) of businesses suffered a data breach as a result of a successful phishing campaign. The trend can be partly attributed to remote working, as businesses struggle to maintain visibility and protect […]

A clever phishing campaign is targeting Office 365 users

Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users. An active phishing campaign is using a crafty combination of legitimate-looking original sender email addresses, spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email […]

McLaren Health Care and Greenwood Leflore Hospital Impacted by Elekta Ransomware Attack

McLaren Health Care Corporation (MHCC), the operator of 15 hospitals and over 100 primary care locations in Michigan and Ohio, has announced the protected health information of 64,600 of its cancer patients may have been compromised in a ransomware attack on vendor Elekta Inc. Elekta provides software and technology services to MHCC facilities in Macomb, […]

Many IP Camera Vendors’ Firmware Contains Serious Vulnerabilities

According to France-based cybersecurity firm RandoriSec, IP cameras sold by a dozen vendors are vulnerable to remote assaults due to many major vulnerabilities discovered in the firmware they all share. Researchers from RandoriSec uncovered a slew of serious and high-severity flaws in UDP Technology’s IP camera firmware, a South Korean business that specialises in digital […]

US legislation moves to secure critical energy infrastructure

  The U.S. House of Representatives approved last week three bills that aim at strengthening cybersecurity measures in critical energy infrastructure. One of the bills titled, H.R.3119, ‘Energy Emergency Leadership Act,’ introduced by House Representatives Bobby Rush, a Democrat from Illinois, and Tim Walberg, a Republican from Mississippi, will help elevate energy emergency and cybersecurity […]

This nasty Microsoft attack could let hackers hijack entire Windows servers

Microsoft’s mitigation doesn’t completely solve the issue, argues researcher (Image credit: Pixabay) A newly-uncovered security flaw in Windows can be exploited by attackers to completely take over a Windows domain, experts have said. The vulnerability, dubbed PetitPotam, coerces remote Windows servers, including Domain Controllers, to authenticate with a malicious destination, thereby allowing adversaries to stage […]