Category: Uncategorized
-
Microsoft: US Healthcare Sector Targeted by INC Ransomware Affiliate Ionut Arghire
Microsoft has observed the threat actor Vanilla Tempest targeting US healthcare organizations with INC ransomware. The post Microsoft: US Healthcare Sector Targeted by INC Ransomware Affiliate appeared first on SecurityWeek. Read More
-
Hackers Demand $6 Million for Files Stolen From Seattle Airport Operator in Cyberattack Associated Press
The Port of Seattle, which owns and runs the airport, has decided not to pay, the official said. The post Hackers Demand $6 Million for Files Stolen From Seattle Airport Operator in Cyberattack appeared first on SecurityWeek. Read More
-
Cybersecurity Awareness: Reflecting on 20 Years of Defense Evolution and Preparing for Future Threats Marc Solomon
Threats have become more complex as the threat surface has expanded and it is now about the evolution of protecting a business and its ecosystem. The post Cybersecurity Awareness: Reflecting on 20 Years of Defense Evolution and Preparing for Future Threats appeared first on SecurityWeek. Read More
-
Healthcare’s Diagnosis is Critical: The Cure is Cybersecurity Hygiene [email protected] (The Hacker News)
Cybersecurity in healthcare has never been more urgent. As the most vulnerable industry and largest target for cybercriminals, healthcare is facing an increasing wave of cyberattacks. When a hospital’s systems are held hostage by ransomware, it’s not just data at risk — it’s the care of patients who depend on life-saving treatments. Imagine an attack…
-
Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector [email protected] (The Hacker News)
Microsoft has revealed that a financially motivated threat actor has been observed using a ransomware strain called INC for the first time to target the healthcare sector in the U.S. The tech giant’s threat intelligence team is tracking the activity under the name Vanilla Tempest (formerly DEV-0832). “Vanilla Tempest receives hand-offs from GootLoader infections by…
-
US Disrupts ‘Raptor Train’ Botnet of Chinese APT Flax Typhoon Eduard Kovacs
The US government has announced the disruption of Raptor Train, a Flax Typhoon botnet powered by hacked consumer devices. The post US Disrupts ‘Raptor Train’ Botnet of Chinese APT Flax Typhoon appeared first on SecurityWeek. Read More
-
GitLab Patches Critical Authentication Bypass Vulnerability Ionut Arghire
GitLab has patched a critical-severity SAML authentication bypass affecting both Community Edition (CE) and Enterprise Edition (EE) instances. The post GitLab Patches Critical Authentication Bypass Vulnerability appeared first on SecurityWeek. Read More
-
GitLab Patches Critical SAML Authentication Bypass Flaw in CE and EE Editions [email protected] (The Hacker News)
GitLab has released patches to address a critical flaw impacting Community Edition (CE) and Enterprise Edition (EE) that could result in an authentication bypass. The vulnerability is rooted in the ruby-saml library (CVE-2024-45409, CVSS score: 10.0), which could allow an attacker to log in as an arbitrary user within the vulnerable system. It was addressed…
-
New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide [email protected] (The Hacker News)
Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) and IoT devices that are likely operated by a Chinese nation-state threat actor called Flax Typhoon (aka Ethereal Panda or RedJuliett). The sophisticated botnet, dubbed Raptor Train by Lumen’s Black Lotus Labs, is believed to have been operational since at…
-
Chinese Spies Built Massive Botnet of IoT Devices to Target US, Taiwan Military Ryan Naraine
Black Lotus Labs estimates that more than 200,000 routers, network-attached storage servers, and IP cameras have been ensnared in the botnet. The post Chinese Spies Built Massive Botnet of IoT Devices to Target US, Taiwan Military appeared first on SecurityWeek. Read More