News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Malware PlugX: propagation via USB devices
B2B Cyber ​​Security ShortNews

Analyzing a ransomware attack, Unit 42 found the PlugX malware. This variant first identifies all connected USB removable media devices, such as floppy, thumb, or flash drives, and then infects all inserted media. If an infected USB stick is connected, the infection immediately spreads to all connected USB devices. Palo Alto Networks Unit 42 released an investigation into tools the team observed responding to a ransomware attack by hacker group Black Basta. Upon investigation, Palo Alto Networks identified several tools of interest on victims' machines, including: the GootLoader malware,...

Read more

Media and journalists targeted by state hackers
Media and journalists targeted by state hackers

Proofpoint IT security researchers have witnessed various state-sponsored hacker groups targeting journalists for espionage, spreading malware and infiltrating media organization networks. Journalists and media organizations are attractive targets for cybercriminals. Proofpoint researchers have observed that APT cybercriminals, particularly those sponsored by or affiliated with a state, routinely impersonate or target journalists or media organizations. The media sector and the people working there can open doors that remain closed to others. Targeted Attacks on Journalist Mail Accounts A well-timed, successful attack…

Read more

Data on used storage media
Kaspersky_news

Kaspersky bought smartphones or storage media that were freely available on the used market, examined them and prepared a report. Some important data could be found on it. Very often old devices and storage media also leave small companies via employees and thus distribute data or access data. Whether computers, mobile devices such as smartphones or storage media, half of the users in Germany (49,9 percent) have already resold such devices used. The buyers are not only happy about cheaper devices, but often also about the data supplied such as music, photos, login data or copies of ID documents of the previous owner….

Read more