-
News Article Jul 14, 2024
AT&T confirms a data breach exposing call and text records for “Nearly All” customers from May 2022 to October 2022. Investigations are underway and 1 arrest has already been made.
-
News Article Jul 12, 2024
On July 12, 2024, AT&T disclosed a data security incident that occurred in 2022. The company confirmed that unauthorized individuals accessed customer data stored on a third-party cloud platform.
-
News Article Jul 12, 2024
A fresh end-to-end phishing toolkit is making the rounds that significantly lowers the barrier to entry for cybercriminals to successfully mount and manage malicious email attacks that evade typical security protections.
-
Blog Post Jul 12, 2024
Certificate Lifecycle Management (CLM) involves discovering, issuing, renewing, and revoking digital certificates, crucial for enterprise cybersecurity. Key pillars: Discover, Deploy, Revoke and Replace, Renew, Integration.
-
Podcast Jul 12, 2024
Root Causes 403: NIST PQC Contest Round 4 and Onramp with Dustin Moody
We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms. We cover going-forward efforts, including Round 4 and the Onramp.
-
News Article Jul 10, 2024
Security researchers have uncovered significant insights into the latest iteration of Ransomware-as-a-Service (RaaS) known as Eldorado.
The sophisticated malware, designed to target both Windows and Linux operating systems, utilizes the programming language Golang to facilitate its cross-platform attacks.
-
News Article Jul 09, 2024
The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities.
-
News Article Jul 09, 2024
Group-IB researchers report a sharp rise in Eldorado – Golang-based ransomware with cross-platform encryption- operations, targeting various industries. Learn how Eldorado ransomware affiliates operate and how to protect your business from attacks.
-
News Article Jul 09, 2024
Building and maintaining a cyber resilience framework is essential for defending against cyberattacks, involving continuous updates and new policies. Cyber resilience ensures that organizations can anticipate, withstand, recover from, and adapt to cyber threats. Jason Soroko from Sectigo underscores the need for thorough risk assessments, robust security architectures, and continuous monitoring. Overall, achieving cyber resilience involves proactive measures, regular system monitoring, employee training, and implementing advanced technologies for swift threat detection and response.
-
News Article Jul 09, 2024
Eldorado, a new ransomware-as-a-service group, has targeted 16 organizations, mostly in the US, since its emergence in spring 2024. Focusing on sectors like real estate and healthcare, Eldorado uses Golang for cross-platform attacks and encrypts files with ChaCha20 and RSA-OAEP. Its ability to shut down and encrypt virtual machines severely disrupts business operations. Experts advise using multi-factor authentication, endpoint detection, regular backups, timely patching, and continuous employee training to defend against such threats.
-
Podcast Jul 09, 2024
Root Causes 402: New Social Engineering Powershell Attack
A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker.
-
Podcast Jul 05, 2024
Root Causes 401: New SSH Remote Code Execution Vulnerability Revealed
A newly revealed OpenSSH vulnerability can open enterprises to remote code execution. We explain what is happening and what to do about it.