WantToCry ransomware remotely encrypts files
Brute-force attempts against SMB services can be early signs of an attack Categories: Threat Research Tags: Ransomware, WantToCry, SMB
Noindex workflow category for imported/news content.
Brute-force attempts against SMB services can be early signs of an attack Categories: Threat Research Tags: Ransomware, WantToCry, SMB
Sophos X-Ops looks at the Atomic macOS Stealer and its capabilities Categories: Threat Research Tags: MacOS, AMOS, infostealer
How the unique anti-exploitation capabilities included with Sophos Endpoint blocked a supply chain attack. Categories: Products & Services Tags: Endpoint, Sophos Endpoint, Exploits
Why most endpoint protection still treats ransomware as just another piece of malware, and what changes when you watch the data instead of the attacker. Categories: Products & Services Tags: Ransomware, Endpoint, Sophos Endpoint, EDR, AI, artificial intelligence
Thursday afternoon, millions of students at thousands of universities and K-12 schools were locked out of Canvas, a piece of catch-all education technology software that has become the de facto core of many classes. ShinyHunters, a ransomware group, hacked Canvas’s parent company and apparently stole “billions” of messages and accessed more than 275 million individuals’…
“Oh my god. Oh my god,” I yelled as I looked at my own face on someone else’s body. It was all there: my five o’clock shadow, my goofy grin, even the bags under my eyes. I was on a Microsoft Teams call interacting with this deepfake version of myself in realtime. Ordinarily the other…
Categories: Threat Research Tags: advisory, Linux, Copy Fail
Categories: Threat Research Tags: advisory, NPM, SAP
This week Joseph talks to Lorenzo Franceschi-Bicchierai, a journalist at TechCrunch. Lorenzo has possibly the deepest understanding of one of the wildest cybersecurity stories in years: how an employee of Trenchant, a government malware vendor that is supposed to only sell to the ‘good’ guys, secretly sold a bunch of hacking tools to a Russian…
The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment Categories: Threat Research Tags: virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2