Data Breaches

Aqua Security releases Real-Time CSPM to tackle multi-cloud security risks

Cloud native security vendor Aqua Security has announced the launch of Real-Time CSPM, a new cloud security posture management solution designed to provide visibility and risk prioritization across multi-cloud security risks. Real-Time CSPM uses “real-time scanning” to pinpoint threats that evade agentless detection and reduce noise so security practitioners can identify, prioritize, and remediate the most important cloud security risks, according to the firm. It is the latest addition to the Aqua Cloud Security Platform.…

Read More

New APT targets South and Southeast Asia with custom-written backdoor

Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, education, and telecom organizations in South and Southeast Asia in an activity that has been ongoing for the past five years, according to Symantec. The group has been seen carrying out the activity with the motive of intelligence gathering. Lancefly has been deploying the Merdoor backdoor in highly targeted attacks since 2018 to establish persistence, execute commands, and perform keylogging on…

Read More

New ransomware gang RA Group quickly expanding operations

Researchers warn of a new ransomware threat dubbed RA Group that also engages in data theft and extortion and has been hitting organizations since late April. The group’s ransomware program is built from the leaked source code of a different threat called Babuk. “Like other ransomware actors, RA Group also operates a data leak site in which they threaten to publish the data exfiltrated from victims who fail to contact them within a specified time…

Read More

Law enforcement crackdowns and new techniques are forcing cybercriminals to pivot

It can seem like cybercriminals are running rampant across the world’s digital infrastructure, launching ransomware attacks, scams, and outright thefts with impunity. Over the last year, however, US and global authorities seized $112 million from cryptocurrency investment scams, disrupted the Hive ransomware group, broke up online illegal drug marketplaces, and sanctioned crypto money launderers, among other operations to crack down on internet-enabled crimes. These developments highlight how quickly investigative tools have evolved to track and…

Read More

New security tool lets you bypass SSL errors

Endpoint-based web and cloud security provider Dope Security has launched a new instant secure socket layer (SSL) error resolution feature on its secure web gateway (SWG) offering, Dope.swg. The new feature is added to simplify SSL inspection conducted by Dope’s SWG and helps admins bypass SSL errors generated as a result of the inspection. “Dope’s main differentiation is its ‘fly-direct’ architecture — rather than re-route all of your Internet traffic to a data center for…

Read More

Brightly Software Notifying 3 Million SchoolDude Users of Data Breach

Brightly Software last week started informing roughly three million individuals that their personal information might have been compromised in a recent data breach. A Siemens subsidiary, Brightly provides asset management solutions, including CMMS, EAM, IoT remote monitoring, strategic asset management, and more. The company claims to have over 12,000 clients worldwide, across different industries. On May 11, the company started sending out notification letters to its SchoolDude users, to flag a cybersecurity incident that occurred…

Read More

Toyota: Data on More Than 2 Million Vehicles in Japan Were at Risk in Decade-Long Breach

A decade-long data breach in Toyota’s much-touted online service put some information on more than 2 million vehicles at risk, the Japanese automaker said Friday. Spanning from January 2012 to April 2023, the problem with Toyota’s cloud-based Connected service pertains only to vehicles in Japan, said spokesperson Hideaki Homma. The Connected service reminds owners to get maintenance checks and links to streaming entertainment and provides help during emergencies. It can call for help after a…

Read More

Israeli threat group uses fake company acquisitions in CEO fraud schemes

A group of cybercriminals based in Israel has launched more than 350 business email compromise (BEC) campaigns over the past two years, targeting large multinational companies from around the world. The group stands out with some of the techniques it uses, including email display name spoofing and multiple fake personas in the email chains, and through the abnormally large sums of money the attempt to extract from organizations. “Like most other threat actors that focus…

Read More

IOTW: Sysco confirms data breach impacting company, supplier and employee data

Food distribution company Sysco has confirmed that customer, business and employee data was stolen in a cyber attack it suffered earlier this year. The cyber attack is thought to have taken place on January 14, 2023 and was detected by Sysco on March 5. According to BleepingComputer, Sysco said in an internal memo sent on May 3 that data from companies and suppliers located in the US and Canada as well as data from US employees…

Read More

New DownEx malware campaign targets Central Asia

A previously undocumented malware campaign called DownEx has been observed actively targeting government institutions in Central Asia for cyberespionage, according to a report by Bitdefender.  The first instance of the malware was detected in 2022 in a highly targeted attack aimed at exfiltrating data from foreign government institutions in Kazakhstan. Researchers observed another attack in Afghanistan. “The domain and IP addresses involved do not appear in any previously documented incidents, and the malware does not share any code similarities…

Read More