Every week, ISMG rounds up cybersecurity incidents in the world of digital assets. In focus between March 17 and 23: New York State Department of Financial Services reminds BitPay that regulations exist. Also, Euler Finance, Gala Games, BitGo, ZenGo, General Bytes, Bitzlato and ParaSpace.
Bitcoin ATM manufacturer General Bytes suspended its cloud services supporting more than 15,000 machines after a hacker exploited a vulnerability in its software to steal user passwords and private keys and made off with cryptocurrency worth millions of dollars.
Russia's invasion of Ukraine in 2022 threw Russia's cybercrime ecosystem into a state of upheaval that still exists to this day. "We identified disruptions to literally every single form of commodified cybercrime," said Alexander Leslie, associate threat intelligence analyst at Recorded Future.
Last year was another bonanza in zero-days for Chinese state hackers, say security researchers in a report predicting a permanent uptick in nation-state exploitation of yet-unpatched vulnerabilities. "Attackers seek stealth and ease of exploitation," writes cybersecurity firm Mandiant.
Microsoft and CrowdStrike once again dominate Gartner's Magic Quadrant for Endpoint Protection. Cybereason has risen to the leaders quadrant and Trellix has fallen to a niche player. The endpoint protection market has rapidly matured in recent years - 50% of organizations have already adopted EDR.
Every week, ISMG rounds up cybersecurity incidents in the world of digital assets. In focus between March 10 and 16: a ChipMixer takedown, Euler Finance and Poolz Finance hacks, bugs on 280 blockchains, Dero coin, and a report from the Financial Action Task Force on ransomware financing.
U.S. and German police seized darknet cryptocurrency anonymizing service ChipMixer, which federal prosecutors say cybercriminals used to launder $3 billion including proceeds from ransomware extortion and North Korean cryptocurrency hacking. Among its alleged customers: LockBit and the Russian GRU.
Threat actors who mine digital assets using other people's infrastructure have found a lucrative new cryptocurrency to motivate their hacking: the privacy-focused currency named Dero. CrowdStrike says it discovered a first - a Dero cryptojacking operation operating on a Kubernetes cluster.
With many security professionals and vendors focusing on security tools and SOC activities, it is easy to overlook the broader scope of an organization’s cyber security mission. Download Mandiant’s award-winning book to learn the six critical functions of cyber defense and how to mature and optimize your cyber...
Security teams are concerned that senior leaders don’t fully grasp the nature of cyber threats. This means that critical cyber security decisions are being made without insights into the adversary and their tactics.
Download Mandiant’s global survey findings to learn:
Insights into how organizations are...
The Defender’s Advantage Cyber Snapshot report offers insights into cyber defense topics of growing importance based on frontline observations and real-world experiences.
Download this report to learn:
The journey to passwordless authentication
Minimizing risk to obtain cyber insurance
Activating cyber defense...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
The Defender’s Advantage Cyber Snapshot was developed with one overarching goal: to provide insights into cyber defense topics of growing importance based on frontline observations and real-world experiences. This issue covers a wide range of topics, from threat analysis to cyber defense best practices.
Download...
Cybersecurity researchers say they are almost certain they have spotted traces of the advanced persistent threat group Dark Pink, which recently emerged, now apparently attacking victims with a newly improved obfuscation routine to evade anti-malware measures.
Hackers are draining millions of dollars from decentralized finance protocol Euler Finance in an ongoing attack. The theft of crypto funds worth $197 million marks the largest exploit in 2023 so far. Euler Finance said it is aware of the incident.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.