fbpx

Richard Giddey

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities

Indian government entities and the defense sector have been targeted by a phishing campaign that’s engineered to drop Rust-based malware for intelligence gathering. The activity, first detected in October 2023, has been codenamed Operation RusticWeb by enterprise security firm SEQRITE. “New Rust-based payloads and encrypted PowerShell commands have been utilized to exfiltrate confidential documents to […]

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities Read More »

St Vincent’s Health Australia says data stolen in cyber-attack

St Vincent’s Health Australia says data stolen in cyber-attack

St Vincent’s – Australia’s largest not-for-profit health and aged care provider – has confirmed it has fallen victim to a cyber-attack and hackers have stolen some of its data. In a statement, St Vincent’s Health Australia confirmed it began responding to a cybersecurity incident on Tuesday. It discovered late on Thursday that data had been

St Vincent’s Health Australia says data stolen in cyber-attack Read More »

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware

The threat actor known as UAC-0099 has been linked to continued attacks aimed at Ukraine, some of which leverage a high-severity flaw in the WinRAR software to deliver a malware strain called LONEPAGE. “The threat actor targets Ukrainian employees working for companies outside of Ukraine,” cybersecurity firm Deep Instinct said in a Thursday analysis. UAC-0099

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware Read More »

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime - Help Net Security

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime – Help Net Security

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security teams then use more AI in response

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime – Help Net Security Read More »

Mortgage Giant Mr. Cooper Data Breach; 14 Million Users Impacted

Mortgage Giant Mr. Cooper Data Breach; 14 Million Users Impacted

Initially, the data breach was thought to affect only 4.3 million current customers, but now the impact has extended to an additional 10 million. In a new cybersecurity incident, Coppell, Texas-based mortgage and loan giant Mr. Cooper has become the latest victim of a cyberattack that may have compromised the sensitive personal information of more

Mortgage Giant Mr. Cooper Data Breach; 14 Million Users Impacted Read More »

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats - Help Net Security

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats – Help Net Security

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats Stellar Cyber announced a new partnership with BlackBerry to deliver a comprehensive threat detection and response solution enabling MSSPs and enterprises to simplify their security stacks, increase productivity, and reduce the time it takes to detect and respond to cyber threats.

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats – Help Net Security Read More »

Labor plan would give home affairs minister powers over critical infrastructure during cyber-attacks

Labor plan would give home affairs minister powers over critical infrastructure during cyber-attacks

Australia’s home affairs minister would be able to order critical infrastructure such as energy, transport or communications entities to take or cease action during a significant cybersecurity situation, under changes proposed by the federal government. In related changes billed as a response to the 2022 Optus and Medibank incidents, the minister could also order companies

Labor plan would give home affairs minister powers over critical infrastructure during cyber-attacks Read More »

Disruptions at 70% of Iran's Gas Stations Blamed on Cyberattack

Disruptions at 70% of Iran’s Gas Stations Blamed on Cyberattack

The responsibility for the attack has been claimed by Gonjeshke Darande,” (which means Predatory Sparrow in Persian), a hacker group that has been targeting Iranian critical infrastructure since 2020. This article has been updated with a correction stating that Gonjeshke Darande is not linked to Israel, and there is no evidence that it is backed

Disruptions at 70% of Iran’s Gas Stations Blamed on Cyberattack Read More »

Northern Ireland police data breach blamed on outdated practices

Northern Ireland police data breach blamed on outdated practices

Outdated information management practices contributed to a massive data breach by the Police Service of Northern Ireland that should act as a “wake-up call” to other police forces, according to an independent review of the debacle. The PSNI missed opportunities to secure and protect data, leading to the leaking of details of 9,500 staff members,

Northern Ireland police data breach blamed on outdated practices Read More »

Ransomware-as-a-Service: The Growing Threat You Can't Ignore

Ransomware-as-a-Service: The Growing Threat You Can’t Ignore

Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of ransomware, one trend that has gained prominence is Ransomware-as-a-Service (RaaS). This alarming development has transformed the cybercrime landscape, enabling individuals with limited technical expertise to carry out devastating attacks. Traditional and double extortion ransomware attacks

Ransomware-as-a-Service: The Growing Threat You Can’t Ignore Read More »

Scroll to Top