Ransomware activity continues to rise, and organizations expect to increase spending on ransomware preparedness. Ransomware groups are continually using new vulnerabilities and coercive tactics to extort payments.
The malware utilizes extensive commands from its C2 server, enabling it to exfiltrate valuable user information, including browser credentials and cryptocurrency wallet details.
MetaStealer is a popular piece of malware that has been observed in recent malicious ad campaigns. The developers of MetaStealer have announced that they are releasing a new and improved version of the malware.
American identity and access management company Okta is acquiring Israeli cybersecurity company Spera for approximately $100-130 million, marking Okta’s first acquisition in Israel and highlighting the strength of the Israeli cyber industry.
Gas stations in Iran experienced widespread disruptions due to a cyberattack claimed by the group Predatory Sparrow, which has previously targeted Iranian critical infrastructure.
VF Corporation, one of the largest apparel companies in the world, reported a cyberattack to the U.S. Securities and Exchange Commission (SEC) on the first day of a new cyber incident reporting rule.
The SEC does not aim to manage security but wants better disclosures. The final rule requires the disclosure of material cybersecurity incidents, but does not require specific technical details to avoid providing a roadmap for future attacks.
The external assessment did not identify any significant vulnerabilities that would allow easy access to the organization’s network, but the internal assessment revealed multiple weaknesses that led to domain compromise.
The Financial Stability Oversight Council has classified artificial intelligence as an “emerging vulnerability” in the financial system, acknowledging both its potential for innovation and the risks it poses.
Xorbot utilizes encryption and decryption algorithms, borrowed from the Mirai source code, to encrypt communication with its command and control server and store sensitive information.