News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware attacks: Costa Rica declares national emergency
Ransomware attacks: Costa Rica declares national emergency

Costa Rican President Rodrigo Chaves declared a national emergency in Costa Rica over the weekend after ransomware group Conti attacked several government offices and stole lots of data. In the meantime, a lot of government data has also been published. The state of emergency declaration was signed by Chaves on Sunday, May 8, the day the economist and former finance minister was named the country's 49th and current president. Costa Rica in national emergency after cyber attacks On Sunday, May 8th, newly elected Costa Rican President Chaves declared a national emergency and…

Read more

Fendt tractor paralyzed by hacker attack
B2B Cyber ​​Security ShortNews

As the Allgäuer Zeitung reports, production at tractor manufacturer Fendt has been halted since last week due to a massive hacker attack. In some cases, even the assembly lines are said to stand still in the Marktoberdorf plant with around 4.000 employees. According to the first unofficial findings, the hacker attack is said to have come from Finland. However, the attack should not only affect Marktoberdorf, but also affect production facilities worldwide. This was announced by the parent company AGCO (Your Agriculture Company), a global manufacturer and distributor of agricultural equipment. As early as May 5, 2022, the company announced a ransomware attack affecting some production facilities. AGCO is investigating...

Read more

Cybercrime trainees preparing for an attack?
Cybercrime trainees preparing for an attack?

Effective division of labor or breeding of cybercrime trainees? After a rather bumbling network infiltration, the professionals finally take over with Lockbit Ransomware. An interesting cyber case has caught the attention of the Sophos researchers. Sophos has uncovered a particular cyber attack: Cyber ​​criminals broke into a regional government server in the United States and stayed there for five months. During this time, they used the server to search online for a mix of hacking and IT administration tools that could help them deploy an attack. The attackers also installed a cryptominer before exfiltrating data and deploying Lockbit ransomware. Attack…

Read more

Alleged LAPSUS$ hackers in court - attacks continue
Alleged LAPSUS$ hackers in court - attacks continue

LAPSUS$ gang caught? The attacks continue nonetheless. Corporate workers should be better educated about attacks using social engineering techniques and be an active part of the defense together with MTR services. The notorious LAPSUS$ gang is(was) attracting a lot of attention with their cybercriminal activities – not only because they have been linked to attacks on Microsoft, Samsung, Okta, Nvidia and others with their extraordinary social engineering techniques and extortion, but also because she still seems to be highly active. And this despite the fact that some of the alleged masterminds have already been arrested. That raises questions. Perfidious tactics...

Read more

Europol blows up one of the largest hacker forums in the world  

As a result of Operation TOURNIQUET, Europol closed the illegal marketplace "RaidForums", one of the largest hacker forums in the world, and confiscated its infrastructure. The complex law enforcement effort was coordinated by Europol to support independent investigations by the United States, United Kingdom, Sweden, Portugal and Romania. The forum administrator and two of his accomplices were also arrested. Launched in 2015, RaidForums was considered one of the largest hacking forums in the world with a community of over half a million users. This marketplace had made a name for itself by offering access to high quality…

Read more

Russian hackers attack NATO detachments
B2B Cyber ​​Security ShortNews

Google Threat Analysis Group published a post titled “Tracking cyber activity in Eastern Europe”. In it, the Google experts describe how Russian hackers carried out very targeted phishing attacks on a NATO competence center. The group COLDRIVER should be responsible for it. The group COLDRIVER, a Russia-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns targeting several US-based NGOs and think tanks, a Balkan country's military and a Ukraine-based defense company. The group was recognized years ago by F-Secure experts (now WithSecure) in their…

Read more

Anonymous attacks Russian government websites
SophosNews

Hackers are also involved in the Ukraine crisis, and according to the latest reports, the Anonymous collective is targeting the Russian government websites, among others. Chester Wisniewski, Principal Security Scientist at Sophos, comments on recent actions and plans. “Anonymous is less a group than an idea. Historically, it inspired people to exercise vigilance on behalf of the wronged and oppressed. Therefore, whenever there is any sign of success against the “dark side”, followers are ready to give credit for such actions, be it a DDoS attack (Distributed Denial of…

Read more

Chinese hackers APT41 active unchecked

Mandiant Threat Intelligence monitors the Chinese hacker group APT41 and its activities. It is currently targeting US authorities, actively exploiting the Log4j vulnerability and vigorously distributing ransomware. In addition, Mandiant has gleaned new insights from an ongoing investigation into APT41, the Chinese hacker group conducting cyberespionage on behalf of MSS, China's civilian intelligence agency. APT41 targets US government agencies and Log4j vulnerability At least six US government agencies were compromised by exploiting vulnerabilities in internet-based web applications. Exploiting the infamous Log4j vulnerability just two days after the Apache Foundation disclosed it. Adaptation of the malware to…

Read more

How hackers infect computers with ransomware
How hackers infect computers with ransomware

Bitdefender details typical gateways for extortion attacks and five ways small business hackers infect machines with ransomware: pirated software, phishing, supply chain, IoT, and tech support scams. Ransomware attacks are now commonplace. Most of the time, companies are targeted by the attackers, because this is where the big money beckons. But that doesn't mean that private users aren't safe. Cyber ​​criminals rely on mass and continuous income from smaller amounts. Such attacks against consumers are increasing. The potential victims should therefore know the most important attack vectors. 5 Pathways of a Typical Ransomware Attack…

Read more

Growth: Crowdsourced security with bug bounty platform
B2B Cyber ​​Security ShortNews

Crowdsourced security prevails: YesWeHack bug bounty platform continues on the road to success. In 2021, the platform more than doubled its annual sales worldwide. The YesWeHack community of ethical hackers has grown by 75 percent globally, with over 35.000 ethical hackers now active on the platform. The past 2021 months marked another record year for vulnerabilities. In 35, YesWeHack saw twice the number of vulnerabilities identified by its hackers compared to the previous year. XNUMX percent of these were classified as "critical" or "high". This means that many enterprise systems and applications would have been seriously impacted if…

Read more