Dialysis firm DaVita, Wisconsin-based Bell Ambulance, and Alabama Ophthalmology Associates all suffered apparent or confirmed ransomware attacks this month.
Автор: Alexander Culafi, Senior News Writer, Dark Reading
Ransomware gang ‘CrazyHunter’ Targets Critical Taiwanese Orgs
Trend Micro researchers detailed an emerging ransomware campaign by a new group known as "CrazyHunter" that is targeting critical sectors in Taiwan.
AI-Powered Presentation Tool Leveraged in Phishing Attacks
Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named "Gamma" in phishing attacks.
China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy Attacks
Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.
What Should the US Do About Salt Typhoon?
Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.
Threat Actors Use ‘Spam Bombing’ Technique to Hide Malicious Motives
Darktrace researchers detailed "spam bombing," a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.
In Salt Typhoon’s Wake, Congress Mulls Potential Options
While the House Committee on Government Reform was looking for retaliatory options, cybersecurity experts pointed them toward building better defenses.
As CISA Downsizes, Where Can Enterprises Get Support?
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.
Google ‘ImageRunner’ Bug Enabled Privilege Escalation
Tenable released details of a Google Cloud Run flaw that prior to remediation allowed a threat actor to escalate privileges.
Google ‘ImageRunner’ Bug Enabled Privilege Escalation
Tenable released details of a Google Cloud Run flaw that prior to remediation allowed a threat actor to escalate privileges.