“Clumsy” BlackByte Malware reuses crypto keys, worms into networks.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 16 October 2021, 2012 UTC.

Content provided by “DarkReading.com.”

Source:  https://www.darkreading.com/

Please click link or scroll down to read your selections.


Latest News

China’s Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes

China’s premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.


‘Clumsy’ BlackByte Malware Reuses Crypto Keys, Worms Into Networks

Discovered during a recent incident response engagement, the malware avoids Russian computers and uses a single symmetric key for encrypting every compromised system.



Enterprise Data Storage Environments Riddled With Vulnerabilities

Many organizations are not properly protecting their storage and backup systems from compromise, new study finds.


US Water and Wastewater Facilities Targeted in Cyberattacks, Feds Warn

CISA, FBI, and NSA issue advisory and defense practices to help these utilities thwart “ongoing” threats targeting IT and OT networks.


6 Lessons From the Expiration of the Let’s Encrypt Root Certificate

Fallout from the transition highlights the need for organizations to monitor and have processes for updating CA roots, experts say.


VirusTotal Shares Data on Ransomware Activity

Google’s online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.


Worried Over Antitrust Debate, Apple Talks Sideloading Dangers

Apple argues in a position paper that sideloading apps poses a major security threat to its users, as many lawmakers and technologists criticize its App Store as a monopoly.


Microsoft Fixes Zero-Day Flaw in Win32 Driver

A previously known threat actor is using the flaw in a broad cyber-espionage campaign, security vendor warns.


Latest Commentary

From Help Desk to Head of SOC: Building a Cybersecurity Career on Empathy and Candor

Why a passion for helping people is key to delivering effective cybersecurity solutions.

Jon Hencinski

Oct 15, 2021


The Human Element Is the Weakest Link

While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.

Ron Bradley photo

Oct 14, 2021



How Security Teams Can Reinforce End-User Awareness

Training programs provide the information, but security teams can reinforce these for better end-user education.

Karen Walsh

Oct 14, 2021


A Close Look at Russia’s Ghostwriter Campaign

The group, which conducts espionage and sows disinformation, is larger than previously thought and has shifted tactics.

Karim Hijazi photo

Oct 13, 2021


Why Choke-Point Analysis Is Essential in Active Directory Security

Defense should focus on high-value choke points first to ensure that their most critical assets are protected, before moving on to deal with other attack paths.

Andy Robbins photo

Oct 12, 2021


—–

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

https://www.hawaiigeopoliticalnews.com

https://www.hawaiisciencedaily.info

https://hawaiinewsdigest.net