Business

FBI Leads International Effort to Seize Domains for Notorious Genesis Market
Business

FBI Leads International Effort to Seize Domains for Notorious Genesis Market

After obtaining a court order, the FBI has taken control of the domains of a well-known marketplace for cybercrime, dealing what it hopes would be a fatal blow to the site's administrators. The Federal Government's "Operation Cookie Monster"—named after the cookies that were sold in prodigious quantities on Genesis Market over the previous five years, coupled with other information required for logging in to third-party machines—was the cause of the action. As a result, the website was crucial in the chain of cybercrime, giving threat actors access to victim networks for data theft, ransomware attacks, fraud, and other crimes read more FBI Leads International Effort to Seize Domains for Notorious Genesis Market. With ReconBee.com Stay ahead of the latest threats with in-depth cov...
White House Allocates $3.1bn to Cybersecurity in New Budget
Business, Risk, Security

White House Allocates $3.1bn to Cybersecurity in New Budget

In its most recent budget report, the White House allotted a total of $3.1 billion on cybersecurity infrastructure. According to the paper, which was published on Thursday, $145 million of this sum will be used to make the Cybersecurity and Infrastructure Security Agency (CISA) "more resilient and defensible." The Cyber Incident Reporting for Critical Infrastructure Act of 2021 will be implemented with $98 million of the remaining monies, while CISA's internal cybersecurity and analytical capabilities will get $425 million in improvements read more White House Allocates $3.1bn to Cybersecurity in New Budget. Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive coverage of the latest threats, breaches, and solutions.
Coinbase breached via SMS cyberattack
Business

Coinbase breached via SMS cyberattack

The cryptocurrency exchange claimed that the breach's perpetrators are probably the same group of hackers who attacked Twilio and Cloudflare. Threat actors gained access to some of Coinbase's data, which led to the hack. However, Coinbase claims it managed to stop it in time, preventing any loss of money or customer data. "Coinbase's cyber security measures prevented the attacker from getting direct system access, preventing any financial losses or consumer data breaches. Only a small portion of our corporate directory's data was disclosed, the business claimed read more Coinbase breached via SMS cyberattack. With ReconBee.com Stay ahead of the latest threats with in-depth coverage of cyber attacks and cybersecurity trends, and the latest cybersecurity news.
Tesla recalls over 350K US vehicles for faulty self-driving software
Business

Tesla recalls over 350K US vehicles for faulty self-driving software

Since US safety authorities discovered that Tesla's fully autonomous driving function potentially result in a crash, the automaker is recalling more than 350k vehicles. Because safety officials found that Tesla Inc.'s Full Self-Driving (FSD) Beta software does not fully abide by traffic safety standards and increases the danger of accidents, the company was compelled to recall 362,758 US vehicles. According to the US National Highway Traffic Safety Administration, the malfunctioning driver assistance system causes the car to read more Tesla recalls over 350K US vehicles for faulty self-driving software. With ReconBee.com Stay ahead of the latest threats with in-depth coverage of cyber attacks and cybersecurity trends, and the latest cybersecurity news.
BEC Groups Target Firms With Multilingual Impersonation Attacks
Business, Risk, Security

BEC Groups Target Firms With Multilingual Impersonation Attacks

Executive impersonation has been used by two business email compromise (BEC) organizations to attack businesses across the globe. Security experts at Abnormal Security have named the threat actors "Midnight Hedgehog," who specialized in payment fraud, and "Mandarin Capybara," who is committed to carrying out payroll diversion assaults, in accordance with their findings. According to Crane Hassold, the director of threat intelligence at Abnormal, "they have launched BEC campaigns in at least 13 other languages, including Danish, Dutch, Estonian, French, German, Hungarian, Italian, Norwegian, Polish, Portuguese, Spanish, and Swedish." Threat actors from Midnight Hedgehog specifically investigated the roles and connections read the complete article BEC Groups Target Firms With Multi...
CERT UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks
Business

CERT UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a warning about potential cyberattacks against Ukrainian governmental institutions using the approved remote access program Remcos. The agency has identified the threat actor behind the widespread phishing campaign as UAC-0050 and based on the toolset used, they believe the action was probably spied-related. The fake emails that begin the infection chain contain a fake RAR archive and purport to be from the Ukrainian telecom business Ukrtelecom. The file contains two files: a text file providing the password to open the password-protected RAR archive and read the complete article CERT-UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks. Keep up with the most recent cybersecurity new...
Iranian Threat Actor Neptunium Associated With Charlie Hebdo Cyber Attacks
Business, Risk, Security

Iranian Threat Actor Neptunium Associated With Charlie Hebdo Cyber Attacks

Microsoft has linked the latest hacking effort against the parody French magazine Charlie Hebdo to the Iranian threat actor known as Neptunium. The information was released last Friday by Microsoft's Digital Threat Analysis Center (DTAC), which also noted that Neptunium is probably the same group that the US Department of Justice (DoJ) has previously referred to as "Emennet Pasargad." The blog post states, "In early January, a then-unknown internet group identifying itself as 'Holy Souls,' which we can now identify as Neptunium read the complete article Iranian Threat Actor Neptunium Associated With Charlie Hebdo Cyber Attacks. To read these types of recent cyber attacks news follow ReconBee.com regularly
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Business

Gootkit Malware Continues to Evolve with New Components and Obfuscations

The threat actors behind the Gootkit virus have added new parts and obfuscated their infection chains, among other "notable improvements" to their toolkit. The UNC2565 activity cluster is being watched by Google-owned Mandiant, which notes that this group is the only one using the malware. Using a tactic known as search engine optimization (SEO) poisoning, victims are deceived into visiting compromised websites when looking for business-related documents like agreements and contracts. These websites are then where Gootkit read the complete article Gootkit Malware Continues to Evolve with New Components and Obfuscations. Just follow ReconBee.com and learn about the recent and latest cybersecurity news.
Business

Shodan – Port and Vulnerability Scanner

Overview Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine that can gather information about Internet-connected devices. This is such as gathering information about a web application or finding vulnerable web cameras that you can easily access. This is a tool worth learning about if you are a web application penetration tester and want to execute a quick port and vulnerability scan. How to use Shodan From the website To do a Shodan search quickly, you can head to their website (https://www.shodan.io/dashboard) and simply enter the domain name of the website. The example below is a search on crucialbits.com. (Note: Searches are limited if you do not have an account. Making an account is free.) Sometimes no results are found. For example, the...
Australian Healthcare Sector Targeted in Latest Gootkit Malware Attacks
Business, Risk, Security

Australian Healthcare Sector Targeted in Latest Gootkit Malware Attacks

By using trustworthy tools like VLC Media Player, recent Gootkit malware loader attacks have targeted the Australian healthcare industry. For first access, Gootkit, also known as Gootloader, is known to use spamdexing and other SEO poisoning techniques. The way it usually operates is by subverting and abusing genuine infrastructure, then seeding those sites with popular terms. Similar to other malware of its ilk, Gootkit is capable of keylogging, adversary-in-the-browser (AitB) assaults, data theft from the browser, screenshotting, and other nefarious deeds. According to recent research from Trend Micro, the infection has spread beyond accounting and legal services providers, with the words read the complete article Australian Healthcare Sector Targeted in Latest Gootkit Malware ...