Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled
Jenna McLaughlin reports: In the first days of March, a team of advisers from President Trump’s new Department of Government Efficiency initiative arrived at the Southeast Washington, D.C., headquarters of the National Labor Relations Board. The small, independent federal agency investigates and adjudicates complaints about unfair labor practices. It stores reams of potentially sensitive data,…
Some risks don’t breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats weren’t the loudest—they were the most legitimate-looking. In an environment where identity, trust, and tooling are all interlinked, the strongest attack path is often the one that looks like it…
Some of the innovative products presented at CES can pose a serious risk to data and privacy. The post The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say appeared first on SecurityWeek.
Bill Toulas reports: U.S. Senator Ron Wyden has sent a letter to the Federal Trade Commission (FTC) requesting the agency to investigate Microsoft for failing to provide adequate security in its products, which led to ransomware attacks against healthcare organizations. The Senator started the formal asking by saying that Microsoft should be held “responsible for its……
Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with a multi-stage malware framework called PS1Bot. “PS1Bot features a modular design, with several modules delivered used to perform a variety of malicious activities on infected systems, including information theft, keylogging, reconnaissance, and the establishment of persistent system
The FCC adopts declaratory ruling requiring telecommunications providers to secure their networks against nation-states and other threats. The post FCC Taking Action in Response to China’s Telecoms Hacking appeared first on SecurityWeek.