You are here

Cybersecurity

Ransomware Awareness – HelloKitty Ransomware Poised for Future Adaptations and Attacks

HelloKitty is a ransomware group operated with a great deal of human interaction which has been active since November 2020. The groups’ notoriety comes from infiltrating corporate networks, stealing data, and encrypting systems to demand ransoms to include double extortion. One of their most significant attacks was on CD Projekt Red in February 2021, where they claimed to have stolen source code for games like Cyberpunk 2077 and Witcher 3. In the summer of 2021, they expanded their targets to include the VMware ESXi virtual machine platform using a Linux variant.

Holiday Season Phishing Surge: USPS and National Postal Services Impersonation Alert

In recent weeks, there has been a significant increase in phishing scams specifically directed at USPS customers. One such elaborate operation involves SMS-based phishing attempts designed to trick recipients into divulging personal and financial data. These attacks utilize a fake USPS identity and mimic postal services in numerous countries worldwide.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – October 10, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Threat Awareness – Phishing Campaign Sets Sights on C-Suite

In a recent report from Menlo Security, it was discovered that “Indeed,” a widely recognized global job search platform headquartered in the U.S., boasting over 350 million monthly visitors and a global workforce of more than 14,000 employees, has become the focus of a significant phishing campaign. This campaign underscores the pervasive threat of abusing trust and how actors exploit credible and popular platforms.

Pages

Subscribe to Cybersecurity