A quick Saturday digest of cybersecurity news articles from other sources.
The top 3 cryptocurrency scams of 2021
Kaspersky says that fake exchanges, fake mining hardware and wallet phishing are the most popular crypto scams of the year, many of which it said have a higher-than-usual level of detail.
AUG
Happy Friday the 13th
Phishing Email Alerts
Catch of the Day:
Chef’s Special:
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples of current ...
Continue Reading →AUG
A quick Saturday digest of cybersecurity news articles from other sources.
AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs
Original release date: July 19, 2021
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques and the D3FEND framework for referenced defensive tactics ...
Continue Reading →JUL
A quick Saturday digest of cybersecurity news articles from other sources.
The Invention of the Typewriter
On June 24, 1868, Christopher Latham Sholes received a patent for something he called a “Type-Writing Machine.” The early tech resembled a piano and had 21 keys.
Continue Reading →
3
JUL
Share
JUL
A quick Saturday digest of cybersecurity news articles from other sources.
Yes, There Really Is A Windows 11
Microsoft announces Windows 11, with a new design, Start menu, and more. A new version of Windows is officially on the way.
Urgent Alert – WD My Book Live users wake up to find their data deleted
Storage-device maker advises customers to unplug My Book Lives ...
Continue Reading →JUN
A quick Saturday digest of cybersecurity news articles from other sources.
3 things you might not know about modern ransomware and how Nefilim makes money
Trend Micro case study explains how the new business model works and how the multistep attacks unfold. A must read.
How could the ...
Continue Reading →JUN
A quick Saturday digest of cybersecurity news articles from other sources.
Fallout and Blame: Ransomware Attack on World’s Largest Meat Supplier
If the cyberattack against meat giant JBS was a game of Clue, it would be over already. The winner would have cracked the whodunnit: “It was the Russians, in the meatpacking plant, with the ransomware.” The attack this week led to a cascading series of shift cancellations, ...
Continue Reading →JUN
Ransomware is a form of malicious software designed to restrict users from accessing their computers or files until they pay a ransom to cybercriminals. Ransomware typically operates through the crypto virology mechanism by using symmetric as well as asymmetric encryption to prevent users from performing managed file transfers or accessing particular files or directories. The cybercriminals are using ransomware to lock files from being accessed assuming that the locked files ...
MAY
A quick Saturday digest of cybersecurity news articles from other sources.
Colonial Pipeline CEO: Paying Ransom ‘Right Thing to Do for the Country’
The Colonial Pipeline ransomware saga continues to unfold before our eyes. This week, company CEO Joseph Blount admitted to paying $4.4 million in ransom to cybercriminals following the attack that shut down the largest fuel pipeline in the U.S. In an interview with the Wall ...
Continue Reading →MAY
A quick Saturday digest of cybersecurity news articles from other sources.
CISA Publishes Eviction Guidance for Networks Affected by SolarWinds and AD/M365 Compromise
Original release date: May 14, 2021
CISA has released an analysis report, AR21-134A Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise. The report provides detailed steps for affected organizations to evict the adversary from compromised on-premises and cloud environments.
Additionally, ...
Continue Reading →MAY