Jessica Molden

Akira Ransomware Poses Growing Threat to Healthcare and Critical Sectors

The Health Sector Cybersecurity Coordination Center (HC3) has released an analyst note detailing the activities of the Akira ransomware group. Akira has conducted 81 cyberattacks, targeting various sectors, including healthcare, and is suspected to have ties with the Conti ransomware gang. HC3 warns that Akira operates as a ransomware-as-a-service (RaaS) operation, employing double extortion tactics […]

Akira Ransomware Poses Growing Threat to Healthcare and Critical Sectors Read More »

Ransomware Attack Shuts Down Healthcare System in Romania: 21 Hospitals Offline

A significant ransomware attack has disrupted the operations of 21 hospitals in Romania, causing their healthcare management system, the Hipocrate Information System (HIS), to go offline. The attack, which occurred over the weekend, encrypted the system’s database, rendering it inaccessible. The Romanian Ministry of Health confirmed the incident and stated that IT specialists, including cybersecurity

Ransomware Attack Shuts Down Healthcare System in Romania: 21 Hospitals Offline Read More »

Colorado State Public Defender’s Office Paralyzed by Cyberattack

A cyberattack targeting the Colorado State Public Defender’s Office has shut down its computer network, leaving public defenders across the state unable to access essential work systems. This attack, identified as malware encryption, has rendered public defenders incapable of accessing court documents and filings and performing significant work for their clients. The Office spokesperson, James

Colorado State Public Defender’s Office Paralyzed by Cyberattack Read More »

New XLoader Variant: Android Malware Evolves to Auto-Launch Threat

A new variant of the XLoader malware has been discovered, capable of automatically launching on infected Android smartphones without user interaction. This strain can extract sensitive data such as photos, messages, and contact lists. Distributed through shortened links in text messages, XLoader impersonates Google Chrome to gain permissions and evade detection. It can even extract

New XLoader Variant: Android Malware Evolves to Auto-Launch Threat Read More »

Ransomware Threat Alert: Urgent Patching Needed for Cisco ASA SSL VPN Vulnerabilities

Security researcher Kevin Beaumont is warning about the efforts of ransomware groups Akira and Lockbit to exploit older vulnerabilities in Cisco ASA SSL VPN devices. These groups target vulnerabilities for which patches have been available since 2020 and 2023. Beaumont emphasizes the importance for administrators to upgrade to the latest ASA release, particularly on devices

Ransomware Threat Alert: Urgent Patching Needed for Cisco ASA SSL VPN Vulnerabilities Read More »

ALPHV/BlackCat Ransomware Resurfaces: Threatens to Expose Stolen Military Documents

The notorious Russian ransomware group ALPHV/BlackCat claims to have stolen a significant amount of military documents from a contractor of the Pentagon, impacting Virginia-based IT services firm Technica Corporation. This firm purportedly has access to classified information from US intelligence agencies. The breach also affected entities like the FBI and DCSA. The ransomware gang threatens

ALPHV/BlackCat Ransomware Resurfaces: Threatens to Expose Stolen Military Documents Read More »

California State Employee Union Targeted in Ransomware Attack

California’s largest state employee union, SEIU Local 1000, was hit by a ransomware attack last month, potentially exposing the sensitive personal information of nearly 96,000 state workers. The breach was discovered two days after it occurred, with the union stating it assessed the damage’s extent. An update confirmed the breach but provided few details, citing

California State Employee Union Targeted in Ransomware Attack Read More »

Strengthening Cybersecurity in Engineering and Manufacturing

The North East Business Resilience Centre (NEBRC) warns engineering and manufacturing firms about the rising threat of ransomware attacks targeting their supply chains. Criminals exploit vulnerabilities within suppliers’ systems, putting businesses at risk of financial loss and reputational damage. To mitigate these risks, firms should conduct regular vulnerability assessments, collaborate closely with suppliers and tech

Strengthening Cybersecurity in Engineering and Manufacturing Read More »

What is your security stack missing?

Ransomware Rakes in Over $1 Billion: A Record High Reflects Cybercriminals’ Exploits

A recent report reveals that victims of ransomware collectively paid over $1 billion to their attackers in the past year, marking a record high. Ransomware attacks occur when hackers infiltrate the computer systems of organizations like businesses and hospitals, encrypting data and demanding cryptocurrency payments for decryption keys or to prevent data leaks. Despite efforts

Ransomware Rakes in Over $1 Billion: A Record High Reflects Cybercriminals’ Exploits Read More »

Cybercriminals Exploit Job Seekers on Facebook with Malware-laden Job Ads

Cybercriminals are exploiting job seekers on Facebook by posting fake job advertisements to distribute malware, specifically the Windows-based Ov3r_Stealer. This malware is designed to harvest sensitive information from infected PCs, including location, passwords, credit card details, and more. The ultimate goal of this campaign remains uncertain, but it’s possible that stolen data could end up

Cybercriminals Exploit Job Seekers on Facebook with Malware-laden Job Ads Read More »