An infostealer (information stealer or just stealer) is a type of malware, usually a Trojan that (like its namesake) is able to sneak in and wreak havoc because it isn’t seen as a threat. Its purpose is to collect information from the infected computer. Such information can be but is not limited to: Passwords saved […]
Ragnar Locker strikes again. CWT, formerly Carlson Wagonlit Travel and fifth largest travel management firm, confirmed a cyber attack, which it said occurred the weekend of July 26-27, 2020. According to Threatpost, CWT stated, “We can confirm that after temporarily shutting down our systems as a precautionary measure, our systems are back online and […]
The Cyber Kill Chain is a model developed by researchers at Lockheed Martin that categorizes seven stages of targeted cyber attacks. The Cyber Kill Chain is used to create an “Intelligence-Driven Computer Network Defense.” This defense model is based on the military concept of the “Kill Chain,” which uses phase-based models to describe different types […]
GitHub has become one of the most popular development platforms for both enterprises and individuals over the past ten years, as the software is relatively easy to use and new features are constantly being added. Unfortunately, it has also become a rich source for sensitive data leaks. According to ZDNet in early 2019, “A scan […]
Ms. Amanda Geraud had been an auditor for years. It has been her job to review business projects and summarize the actions taken, costs involved, as well as benefits or losses to her employer. Today felt no different than so many others before, when she had to explain the chain of events leading to preventable […]
SCADA under attack In April 2020, Israeli National Cyber Directorate alerted water utility companies after hackers took aim at their systems. The attackers targeted supervisory control and data acquisition (SCADA) systems linked to pumping stations, sewage facilities, as well as wastewater treatment plants. This prompt governmental notification urged energy and water organizations to update their […]
When it comes to sensitive data leak, time is of the essence. It doesn’t take long for a leak to turn into a data breach. A few weeks ago, Comparitech’s security research team set up a honeypot simulating a database on an ElasticSearch instance, and put fake user data inside of it. The first attack […]