December 20, 2022

Two men hacked into JFK airport taxi system so they could charge cabbies to cut the line

Share this… ABAYEV and LEYMAN, who are United States citizens living in Queens, New York, and Russian nationals living in Russia (the “Russian Hackers”), engaged in a scheme (the “Hacking Scheme”) to hack the Dispatch System at JFK beginning at least in September 2019 and continuing at least through September 2021. The Russian Hackers were …

Two men hacked into JFK airport taxi system so they could charge cabbies to cut the line Read More »

5 Key Takeaways from the 2022 Compliance Benchmark Report

Originally published by A-LIGN. Written by Patrick Sullivan, A-LIGN. Our 2022 Compliance Benchmark Report detailed how organizations are navigating the current compliance landscape, as well as how they are preparing for the future. By surveying more than 200 cybersecurity, IT, quality assurance, internal audit, finance, and other professionals, we learned how organizations make their compliance …

5 Key Takeaways from the 2022 Compliance Benchmark Report Read More »

Scammer behind the “OneCoin” cryptocurrency pyramid scheme, which included several billions of dollars, pleads guilty

Share this… At least nine persons, including Greenwood and Ignatova, have been charged with fraud in connection with OneCoin by the United States government in four separate but connected cases. The Chinese government has brought charges against 98 individuals on the suspicion that they attempted to sell OneCoin. 18 people were taken into police custody …

Scammer behind the “OneCoin” cryptocurrency pyramid scheme, which included several billions of dollars, pleads guilty Read More »

M3AAWG and FIRST join forces to make internet a safer place

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) have unveiled that they will work together to combat growing internet abuse and cybersecurity issues. The two groups plan to combine forces to develop and train abuse desk and incident response teams in best practices of Domain …

M3AAWG and FIRST join forces to make internet a safer place Read More »

Be careful of Risepro malware, a new version of Vidar Infostealer

Share this… The newly discovered information stealer known as “RisePro” is being delivered through the pay-per-install malware downloader service known as “PrivateLoader,”. RisePro is a backdoor that is written in C++ and it gathers potentially sensitive information from workstations that have been hacked. It then tries to exfiltrate this information as logs. Malware known as …

Be careful of Risepro malware, a new version of Vidar Infostealer Read More »

Firms, Attys Found In Contempt In Insurer Computer Theft Suit

By James Mills (December 21, 2022, 12:01 AM EST) — A federal judge in California has issued sanctions and contempt of court charges against two law offices and their attorneys over their unwillingness to participate in depositions or produce documents in a lawsuit regarding a computer and data allegedly stolen from an insurance company…. Read …

Firms, Attys Found In Contempt In Insurer Computer Theft Suit Read More »

CyberCube raises 50$ million

CyberCube has raised $50 million in additional growth capital from investment funds managed by Morgan Stanley Tactical Value (Morgan Stanley), with continued participation from all existing investors Forgepoint Capital, Hudson Structured Capital Management (Bermuda), MTech Capital, and key investors from Stone Point Capital. Scott G. Stephenson, former Chairman, President and CEO of Verisk, also participated …

CyberCube raises 50$ million Read More »

TechSperience Episode 116: How Artificial…

Retailers can reduce shrinkage, diminish stockout, and enhance experiences for customers and employees with artificial Intelligence (AI). But that is just scratching the surface. AI-enabled intelligent stores can optimize so much more like managing staffing resources, reaching sustainability goals, and even predicting customers’ needs. This podcast explores how AI solutions – a combination of data …

TechSperience Episode 116: How Artificial… Read More »

Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks

Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks Ransomware From September to December, we detected multiple attacks from the Royal ransomware group. In this blog entry, we discuss findings from our investigation of this ransomware and the tools that Royal ransomware actors used to carry out their attacks. By: Ivan …

Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks Read More »

Q&A From SANS Special Broadcast: What You Need to Know About OpenAI’s New ChatGPT Bot – and How it Affects Your Security

On December 21, 2022, attendees joined us for a SANS Special Broadcast: What you need to know about OpenAI’s new ChatGPT bot – and how it affects your security. If you couldn’t make it, you can watch the replay here. Our speakers Rob Lee, Jorge Orchilles, David Hoelzer, and Ed Skoudis gave lightning talks, had …

Q&A From SANS Special Broadcast: What You Need to Know About OpenAI’s New ChatGPT Bot – and How it Affects Your Security Read More »

Detecting Windows AMSI Bypass Techniques

Techniques bypassing AMSI were primarily used by security researchers and penetration testers. In recent years, however, cybercriminals have abused this and included the method as a feature in malware routines to evade detection that allowed them to continuously operate in a victim’s computer. Prior to AMSI, detections of fileless threats proved difficult. Previously documented methods …

Detecting Windows AMSI Bypass Techniques Read More »

Each Elastic office has its own locally-designed mural. See them all.

We’re a distributed, global company (and proud of it), but we do want to give Elasticisians a place to connect face-to-face should they choose. In fact, building community is one of our top priorities here at Elastic. That’s why we have offices in 15 cities around the world. While some Elasticians use them to work …

Each Elastic office has its own locally-designed mural. See them all. Read More »

A Technical Analysis of CVE-2022-22583 and CVE-2022-32800

A Technical Analysis of CVE-2022-22583 and CVE-2022-32800 Exploits & Vulnerabilities This blog entry discusses the technical details of how we exploited CVE-2022-22583 using a different method. We also tackle the technical details of CVE-2022-32800, another SIP-bypass that we discovered more recently, in this report. By: Mickey Jin December 21, 2022 Read time:  ( words) On …

A Technical Analysis of CVE-2022-22583 and CVE-2022-32800 Read More »

ThreeUK is blocking Tutanota. While ThreeUK says the applied adult filter was standard for any email provider, other services are not blocked.

In the United Kingdom, ThreeUK internet users are unable to access Tutanota mailboxes on mobile connections since the beginning of November. Even though we reached out to ThreeUK over one month ago, the issue is still not fixed. A possible reason could be a wrongly applied adult filter. Regardless of what is causing the issue, …

ThreeUK is blocking Tutanota. While ThreeUK says the applied adult filter was standard for any email provider, other services are not blocked. Read More »

Update: InteractiveSieve Version 0.9.2.0

Update: InteractiveSieve Version 0.9.2.0 New features: Loading files from command line arguments Column index to right click-menu “Hide (if equal to prev and next)” to right click-menu “Values separator…” to right click-menu “Hide duplicates” to right click-menu Added column filtering when loading files InteractiveSieve_V_0_9_2_0.zip (http)MD5: 74A4019A36199C5057207184341FB639SHA256: D9481C99F44FCEA0729F526B70E307881E2128FB1EB23DF135790EDB4392CB4A No comments yet.Read more

Data Collection Costs Epic Games Half a Billion USD

According to the FTC, the developer of Fortnite and Fall Guys, Epic Games, deployed design tricks called “dark patterns” and duped millions of players into making unintentional purchases. The Federal Trade Commission (FTC) has announced to charge Epic Games with a $520 million settlement concerning the alleged violation of the Children’s Online Privacy Protection Act …

Data Collection Costs Epic Games Half a Billion USD Read More »

Sysdig CEO on How Open Source Fuels Cloud, Container Defense

Suresh Vasudevan on Why Falco Has Become the Industry Standard for Threat Detection Michael Novinson (MichaelNovinson) • December 20, 2022     Suresh Vasudevan, CEO, Sysdig (Image: Sysdig) Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig’s Falco open-source threat detection engine to secure their environments. See Also: …

Sysdig CEO on How Open Source Fuels Cloud, Container Defense Read More »

Russian Hackers Targeted Oil Refinery Firm in NATO Country

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Social Engineering ‘Gamaredon,’ Tied to FSB, Expands Intelligence Ops as Invasion of Ukraine Persists David Perera (@daveperera) • December 20, 2022     Gas leaks from the Nord Stream 2 pipeline into the Baltic Sea after the September 2022 explosion (Image: Danish Defense) A hacking …

Russian Hackers Targeted Oil Refinery Firm in NATO Country Read More »

Hack on a Services Firm’s Vendor Affects 271,000 Patients

3rd Party Risk Management , Governance & Risk Management , Healthcare Breach Is Latest in Long List of Complex Vendor Incidents Marianne Kolbasuk McGee (HealthInfoSec) • December 20, 2022     An Oklahoma-based provider of administrative and technology services to healthcare organizations is notifying more than 271,000 individuals that their personal information may have been …

Hack on a Services Firm’s Vendor Affects 271,000 Patients Read More »