
Category: Threat Intel Reports
-
Courts Are Still Willing To Dismiss Data Breach Lawsuits for Lack of Standing
Raika Casey and Alexis Opper of BakerHostetler write: In data breach litigation, courts generally find plaintiffs have standing such that…
-
FCC proposes new cybersecurity mandates for submarine cable operators in major rule review, seeks pu
Industrial Cyber reports: The U.S. Federal Communications Commission (FCC) is conducting its first comprehensive review of submarine cable rules since…
-
Appellate court upholds sentence for former Uber cyber executive Joe Sullivan
Jonathan Greig reports: The conviction of former Uber chief security officer Joe Sullivan on obstruction of justice charges was upheld…
-
Security Affairs newsletter Round 515 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
New Akira ransomware decryptor cracks encryptions keys using GPUs
Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to…
-
A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.
A Micronesian state suffered a ransomware attack and was forced to shut down all computers of its government health agency.—————————————————————————————————————————A…
-
PA Turnpike Scam Text Messages
*  [Scamming – Fraud](/categories/phishing-scamming-fraud-identity-theft/) PA Turnpike Scam Text Messages==============================*  0 0*  4*  1 * …
-
Venmo Fraud Department Scam Calls
*  [Scamming – Fraud](/categories/phishing-scamming-fraud-identity-theft/) Venmo Fraud Department Scam Calls=================================*  1 1*  6*  1 * …
-
Is 9259062000 Kaiser Permanente Call a Scam?
*  [Suspicious](/categories/suspicious/) Is 9259062000 Kaiser Permanente Call a Scam?============================================*  2 2*  5*  1 * …
-
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
MalwareSocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware=================================================================================Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware…

