Search results

  1. Carding

    Australia to build six cyber shields to ensure national security

    By 2030, the state plans to become a world leader in cybersecurity. Australian Home Affairs Minister Claire O'Neill announced the creation of "six cyber shields around the nation" as part of the national cyber security strategy. The strategy includes six key areas, namely: education for...
  2. Carding

    The civil servant spent the money stolen from credit cards on house repairs and a Chanel bag

    An American woman from Northern Kentucky (Ohio) was sentenced to 3.5 years in prison for stealing 185 thousand dollars from a municipal credit card and cards of her colleagues. The Messenger also clarifies that after that, she will serve another three years of probation. Now Allison Donaldson...
  3. Carding

    Финансово мотивированный субъект угрозы UNC3944 смещает фокус на атаки с использованием программ-вымогателей

    Финансово мотивированный субъект угрозы, известный как UNC3944, переходит к развертыванию программ-вымогателей в рамках расширения своих стратегий монетизации, сообщил Mandiant. "UNC3944 продемонстрировал более пристальное внимание к краже больших объемов конфиденциальных данных в целях...
  4. Carding

    Retool становится жертвой фишинг-атаки на основе SMS, затрагивающей 27 облачных клиентов

    Компания-разработчик программного обеспечения Retool сообщила, что учетные записи 27 ее облачных клиентов были скомпрометированы в результате целенаправленной атаки социальной инженерии на основе SMS. Фирма из Сан-Франциско обвинила функцию облачной синхронизации аккаунта Google, недавно...
  5. Carding

    Hook: новый банковский троян для Android, расширяющий наследие ERMAC

    Новый анализ банковского троянца Android, известного как Hook, показал, что он основан на своем предшественнике под названием ERMAC. "Исходный код ERMAC использовался в качестве основы для Hook", - заявили исследователи безопасности NCC Group Джошуа Камп и Альберто Сегура в техническом анализе...
  6. Carding

    Думаете, ваши решения MFA и PAM защищают вас? Подумайте еще раз.

    Когда вы внедряете продукт безопасности, вы предполагаете, что он выполнит свое предназначение. К сожалению, однако, это часто оказывается не так. Новый отчет, подготовленный Osterman Research по заказу Silverfort, показывает, что решения MFA (многофакторная аутентификация) и PAM (Управление...
  7. Carding

    Новая операция по криптоджекингу AMBERSQUID нацелена на необычные сервисы AWS

    Новая облачная операция по криптоджекингу нацелилась на необычные предложения Amazon Web Services (AWS), такие как AWS Amplify, AWS Fargate и Amazon SageMaker, для незаконного майнинга криптовалюты. Вредоносная киберактивность получила кодовое название AMBERSQUID от фирмы Sysdig, занимающейся...
  8. Carding

    Why are we being deceived? The unsightly side of security guides.

    Find out the truth behind the security guidelines. The cybersecurity instructions you receive at work may cause confusion? You are not alone. According to a recent study, there are a number of problems in the wording of these guidelines. The authors suggest simple measures to improve the...
  9. Carding

    Gandalf - a cyber polygon that failed the security test

    The neural network hacking training platform itself has become a privacy threat. The Swiss company Lakera AI, developer of the Gandalf educational platform designed to teach the risks of "prompt injection" attacks in Large Language models (LLM), recently fixed a vulnerability in its system...
  10. Carding

    Xi Jinping's new dangerous game: Students or future spies?

    Chinese students become part of a grandiose antispyware program. In early September, when students were returning to Chinese universities, they were confronted with an unexpected program: spy detection courses. At Tsinghua University, teachers and students were instructed on how to become a...
  11. Carding

    Lazarus malware delivered to South Korean users via supply chain attacks

    $240 Million in 3 Months: Lazarus Fleeces Crypto Platforms One by one Who will be the next victim of North Korean cybercriminals? North Korean hacker group Lazarus has stolen almost $240 million worth of cryptocurrencies over the past 3 months, according to the analytical company Elliptic...
  12. Carding

    Rusty Flag Campaign-Manipulation and stealth in cyber attacks on Azerbaijan

    Who needs to hide behind other cybercriminals for attacks? Cybersecurity researchers from Deep Instinct discovered a new campaign, called Rusty Flag, aimed at Azerbaijani targets. The attacks use a decoy document related to the Karabakh conflict and a new type of malware in the Rust programming...
  13. Carding

    EU vs TikTok: Battle for teen data

    TikTok Siphons Millions of Dollars From Naive Crypto Investors Users of the popular video platform have been following obvious fraudulent schemes for several years. Recently, the TikTok platform has become a kind of field of activity for scammers who organize fake cryptocurrency sweepstakes...
  14. Carding

    The American casino Caesars Entertainment paid extortionists a huge ransom

    404 comfort not found: How Vegas guests Survived Cyberattacks on MGM and Caesars The story tells itself on platform X. Last week, we watched ransomware attacks on two well-known Las Vegas hotel and entertainment chains-MGM and Caesars . Foreign media continuously covered both incidents. Two...
  15. Carding

    Updated Sphynx malware from the BlackCat group will encrypt your entire infrastructure in one click

    BlackCat hackers are not slumbering, unleashing their fury on an increasing number of companies. The well-known hacker group BlackCat (ALPHV) uses proprietary Sphynx software and stolen Microsoft accounts to encrypt Azure cloud storage. Among the victims is one of the unnamed client companies...
  16. Carding

    Tracking on the edge of a foul: who collects your data under the guise of health care?

    Limit your apps permissions before they learn too much about you. Leading Android activity monitoring apps expose their users to threats of surveillance and identity theft due to the abundance of risky and often unnecessary permissions for correct operation. In the digital age, mobile apps...
  17. Carding

    The American casino Caesars Entertainment paid extortionists a huge ransom

    Final Giveaway: Caesars Entertainment faces legal action as a result of the leak It seems that the company has finally lost in cybersecurity roulette. Hotel and entertainment chain Caesars Entertainment is facing a class - action lawsuit the day after claiming a massive leak. Clients demand...
  18. Carding

    Hook vs ERMAC: How the older brother taught the younger one bad manners

    How are banking Trojans fundamentally different and why is this important? Recent cybersecurity research has revealed that a new banking Trojan for Android called Hook is based on another once-famous ERMAC Trojan. Experts from the NCC Group, Joshua Camp and Alberto Segura, published a technical...
  19. Carding

    Oriental Tales: Peach Sandstorm and the Art of Digital Exploration

    Iranian hackers are throwing sand in the eyes of strategic organizations around the world. Microsoft researchers discovered a series of attacks using a special password matching method, conducted by the APT33 group, also known as Peach Sandstorm, Holmium, Elfin and Magic Hound. The main goals...
  20. Carding

    The American casino Caesars Entertainment paid extortionists a huge ransom

    Hacked Las Vegas: what is the uniqueness of Scattered Spider and BlackCat Everyone already knows about the attacks on MGM and Caesars, but how did the criminals manage it? Two of the leading entertainment corporations in Las Vegas, MGM and Caesars, faced large-scale hacker attacks. MGM systems...
Top