CharlieMcHenry, to infosec
@CharlieMcHenry@connectop.us avatar
TechDesk, to Cybersecurity
@TechDesk@flipboard.social avatar

Ransomware attacks are causing hospitals to cancel surgeries, stalling essential financial services and putting student data at risk and it looks to be on the rise. Axios looks into the government initiatives set to help combat such attacks and the current progress being made.

https://flip.it/myV7AQ

#Ransomeware #Cybersecurity

cardamomaddict, to random
@cardamomaddict@mstdn.ca avatar

Augh. Going after hospitals and libaries is really low and hurts the community's most vulnerable. But that's the point with these guys, isn't it?

#Libraries #TorontoPublicLibrary #ransomeware

https://toronto.ctvnews.ca/a-ransomware-attack-hit-toronto-public-library-here-s-what-that-means-1.6634968

AskPippa, to Cybersecurity
@AskPippa@c.im avatar

Zero respect for bad player #hackers who do #ransomeware attacks. This one affected 5 hospitals -- which has super personal, information on thousands of patients.

Healthcare needs proper help when it comes to #Cybersecurity.

Think of the last time you had a medical visit -- would you really want the world to learn about it?

https://globalnews.ca/news/10063578/ontario-hospitals-ransomware-attack/

ChristinaLekati, to Cybersecurity

It appears that the ALPHV ransomware group is behind MGM Resorts' cyberattack on Monday. The way they reportedly gained initial access is by looking into the MGM employees on LinkedIn, picking one, and then calling the Help Desk.

The ALPHV group is said to be "extremely skilled at social engineering".

Yet finding information on an organization's employees on LinkedIn & and then using it in a vishing attack, often impersonating that individual, is a frequent and rather standard practice in attacks.

I have seen first-hand that there is a need to improve in a few areas:

🔹 Few organizations are prepared to handle phone-based social engineering. Most companies focus almost entirely on attack simulations.
That allows blind spots and a lack of processes/preparedness in too many other areas like vishing, social media and SMS-based attacks among other things.

🔹 Having a proper identity verification process in place and training your employees to stick with it often mitigates a lot of vishing/impersonation attacks.
Yet in most cases, there is either a lack of verification process or the employees are not aware of it (they sometimes get trained on it once during onboarding, and then forget all about it).

🔹 Understanding that social engineering is not limited to email attacks. It is a serious threat, and it requires working on a comprehensive social engineering prevention protocol.

We are still waiting for more information on the exact methodology. But it won't be the last time we hear of a similar attack scenario.

News Reporting:

https://cybernews.com/security/mgm-cyberattack-claimed-alphv-blackcat-ransomware-group/

david_senate, to random

"Heads up: threat actors are now deploying a Go-language implementation of Cobalt Strike called Geacon that first surfaced on GitHub four years ago and had remained largely under the radar."

https://www.darkreading.com/attacks-breaches/attackers-use-geacon-as-new-cobalt-strike-for-macos-systems

#Apple #MacOS #Cybersecurity #cybercrime #Ransomeware

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines