Who's been disrupting ransomware operations' data leak sites by targeting them with distributed denial-of-service attacks? No one has yet claimed credit for the ongoing disruptions and slowdowns, but one likely theory is that rival operations are attempting to cause each other pain.
An attacker stole at least $370,000 worth of USDC stablecoins from a smart contract on the Avalanche blockchain in a flash loan attack, affecting liquidity providers. Victim Nereus Finance is enticing the thief to return the stolen funds for a 20% "no questions asked" white hat reward.
U.S. sanctions on Tornado Cash are driving North Korean hackers away from the cryptocurrency mixer. Chainalysis says hackers' use of ineffective obfuscation techniques allowed the blockchain analysis firm to participate in an operation that recovered $30 million stolen from the Ronin bridge.
Thoma Bravo halted efforts to buy publicly traded cybersecurity AI vendor Darktrace this week after the two sides failed to agree on the terms of the buyout. The private equity giant walked away from what would have been its third take-private cybersecurity acquisition of 2022.
The world's largest cryptocurrency trading platform is bankrolling a lawsuit challenging the U.S. Department of the Treasury's sanctions against Tornado Cash. The cryptocurrency mixer is a favored tool of North Korean crypto thieves, who use it to launder stolen funds.
Whether for profit or in furtherance of Russian geopolitical interests - or both - former members of the Conti ransomware group have been targeting networks operated by the Ukrainian government and businesses, as well as European nonprofit organizations, Google's Threat Analysis Group reports.
Bitwarden has raised $100 million to expand into new product areas including developer secrets, passwordless and privileged access management. The investment will help the firm debut new features for individual and business users and expand its footprint in Japan, Germany, France and South America.
CISO Marcin Szczepanik recalls when his team's budget was cut dramatically after the onset of the pandemic. He wanted to invest in the latest state-of-the-art tools but prioritized his costs and focused on email security - a move that improved the company's level of cyber maturity.
In the latest "Proof of Concept," VP and CISO Nicole Darden Ford shares findings from Rockwell Automation's new survey report on cybersecurity preparedness in critical infrastructure, OT security gaps, the state of critical infrastructure, and insights into preparedness and best practices.
A recent survey sponsored by Rockwell Automation finds that critical infrastructure organizations miss basic protections for operational technology, with 80% failing to conduct frequent asset inventory audits, 63% lacking real-time threat monitoring and 42% needing effective patch management.
An Iranian state-sponsored group in operation since 2015 relies on highly targeted social engineering to try and attack individuals and organizations that Tehran deems enemies of the regime, says a new report from cyberthreat intelligence firm Mandiant.
Two individuals exploited a flaw in an unaudited smart contract deployed by Rug Pull Finder, a web3 security company that offers smart contract audits to blockchain companies. They scooped up 450 non-fungible tokens from the "Bad Guys" collection, whose theme is bad guys stealing NFTs.
In today's dynamic threat environment, security teams must adopt a risk-based approach, prioritizing the most important areas of their organization. They also should not be afraid to seek outside help. Murtaza Hafizji of Bugcrowd discusses the merits of crowdsourced security.
In the latest "Proof of Concept," experts join ISMG editors to discuss concerns over Twitter's security leading up to the U.S. midterm elections, the move by the U.S. Department of Justice to file its most sensitive court documents on paper, and the recent sanctions against Tornado Cash.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.