The leak will help some security firms put together stronger defensive playbooks that they can recommend to their customers in order to improve their ability to detect Conti intrusions—now knowing exactly what operations Conti affiliates might execute.
Hackers apologize for the Colonial Pipeline ransomware attack and promise modernization to target less controversial victim
‘We are apolitical, we do not participate in geopolitics’
Multiple cyber threats lurking compromised systems: Microsoft
Facing multiple hacking attempts on its business email servers worldwide, Microsoft has reiterated the warning that patching a system does not necessarily remove the access of the attacker.
Ransomware Pushed to Compromised Exchange Servers by Recent Chinese Hackers
"If they push ransomware to this, we're going to have the worst day ever." Unfortunately that is exactly what happened.
FBI Issues Ransomware Warning of Egregor Attacks on Businesses Globally
The agency said the malware has already compromised more than 150 organizations and provided insight into its ransomware-as-a-service behavior.
Fighting Ransomware with Cloud Backups and Data Immutability
Keeping data backups offsite greatly reduces your ransomware risk
FBI Warning: Phishing Emails Pushing Fake Government Stimulus Checks
Anyone who receives such texts or emails should ignore them or delete them. Never click on links because you might download malware onto your computer. In some cases, fake phishing scams might ask for a person’s bank account information and insist $1,000 or more will be deposited directly into his...
2020’s Twenty Tips: Mistakes to avoid
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
Sextortionists return for Christmas – price goes down, threats go up
A week ago, a concerned Naked Security reader shared with us a “send us money or else” email that was a bit different from others he’d received in the past. The claims and the demands followed a predictable theme – one that we call sextortion because of the connection between sexuality and extortion. Simply...
If Your IT Company Can’t Protect Itself – It Can’t Protect You! Pay Attention, This May Sting a Little!
IT Providers are considered high targets and we take this threat very seriously. If we are breached our clients will be the ones victimized.