Study on cyber security in companies
In today’s digitally networked world, companies are increasingly the target of cyber attacks.
Attackers are primarily targeting managers, who are a particularly attractive target group due to their access to sensitive data and extensive rights within IT systems.
Wrong investment tips
Fraudsters are constantly coming up with new tricks to scam money from internet users.
Now fake videos are doing the rounds in which supposed celebrities advertise investments, including SAP co-founder Dietmar Hopp.
Microsoft Office alternative
The IT security provider ESET has discovered two security vulnerabilities in the Microsoft Office alternative WPS Office for Windows.
The vulnerability CVE-2024-7262 in the Office application enabled the hacker group APT-C-60 to use an exploit to execute foreign code on its victims’ devices.
700,000 US dollars in Bitcoin
Computer engineer Daniel Rhyne is said to have launched a massive cyberattack against his own employer.
Rhyne, who worked as a virtual machine (VM) expert at the company, used his position to secretly create a virtual machine on the company’s network.
The Sophos X-Ops team has disclosed a new attack variant of the Qilin ransomware group.
As part of a recent investigation into a Qilin ransomware attack, the Sophos X-Ops team discovered that the attackers stole credentials stored in Google Chrome browsers on certain network endpoints.
After dismantling
The takedown of the LockBit ransomware group in February 2024 shook the cybercrime world.
According to WithSecure’s new report, LockBit is now in a rebuilding phase, with clear signs of a planned comeback.
240 GB archive
Japanese car manufacturer Toyota recently confirmed an incident in which customer data was exposed through a security breach at a third-party provider.
A hacker had previously published a 240 GB archive of stolen data on a hacker forum.
Comment
Current data shows that the threat of artificial intelligence (AI) in cybercrime is seen as an increasingly serious risk.
Companies are therefore increasingly shifting their focus from reactive defense to preventive security.
Comment: Ransomware analysis
The ransomware landscape remains dynamic and fast-moving.
This is demonstrated by the significant increase in ransomware attacks and their impact in the second quarter (April-June) of 2024.
The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.