Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free. […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as “time” related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. […]
A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers. […] Go to Source Author: Lawrence Abrams
Microsoft detailed a sophisticated campaign that relies on a social engineering technique, “ClickFix,” in which a phisher uses security verification like captcha to give the target a false sense of safety. Go to Source Author: Alexander Culafi, Senior News Writer, Dark Reading
A pair of researchers plan on detailing effective tools to dig into the effectiveness of vehicle cybersecurity without breaking the bank. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Law enforcement discovered admin credentials on the suspect’s computer for an online repository hosted on the Dark Web that stored source code for multiple versions of the LockBit builder. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Microsoft says it partially mitigated a week-long Exchange Online outage causing delays or failures when sending or receiving email messages. […] Go to Source Author: Sergiu Gatlan
The Mora_001 group uses similar post-exploitation patterns and ransomware customization originated by LockBit. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
The Black Basta ransomware operation created an automated brute-forcing framework dubbed ‘BRUTED’ to breach edge networking devices like firewalls and VPNs. […] Go to Source Author: Bill Toulas
Cisco has patched a denial of service (DoS) vulnerability that lets attackers crash the Border Gateway Protocol (BGP) process on IOS XR routers with a single BGP update message. […] Go to Source Author: Sergiu Gatlan
