Cybercrime Current Events: AWS Takeover Campaign, Ransomware Attack on Columbus, and City of Columbus Sues Ransomware Researcher Whistleblower
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of Leaky Weekly, […]
Actualités cybercriminelles: une brèche de sécurité pour une agence de vérification d'antécédents, une reprise de possession de blogue rançongiciel, une querelle entre forums et la double arrestation de "J.P. Morgan"
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of Leaky Weekly, […]
Lancement de Leaky Weekly avec Flare, podcast sur l'actualité de la cybercriminalité
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. Tune in for current events every […]
Ransomware in Context: 2024, A Year of Tumultuous Change
2024 has started off dramatic shifts in the ransomware landscape. In December of 2023 international law enforcement took down the BlackCat leaks site, leading to the group removing all ethical restrictions for their affiliates and declaring all organizations in Western Europe and the United States viable targets to include nuclear power plants and childrens hospitals. […]
LockBit’s Conversation on XSS Forum with an Initial Access Broker
In February of 2024, admins of the Russian hacking forum XSS banned the primary LockBit account active on the forum. The ban was the result of a dispute between LockBit, and an initial access broker operating under the username “aa.” The following is a conversation between AA and LockBit, posted on XSS as aa sought […]
Threat Spotlight: Data Extortion Ransomware Threats
Over the last few years, the ransomware landscape has changed significantly. Between 2022 and 2023, ransomware attacks increased by more than 100% year-over-year, with more attacks consisting of double and triple extortion. At a high level, the categories of ransomware can be defined as: Modern ransomware attacks are no longer a lone individual sitting at […]
Mettre en œuvre une gestion continue de l’exposition aux menaces : un guide rapide pour 2024
This year, Gartner named “Continuous Threat Exposure Management (CTEM)” as one of the top trends for Optimizing for Resilience. This is a response to increasing attack surfaces and thus cybercrime, and is the approach that best suits the evolving threat landscape. Organizations’ attack surfaces have exponentially increased over the past few years largely due to […]
Cyberguerre moderne : attaques DDoS participatives
Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring certain political elements or governments leverage a broader ecosystem. Since Distributed Denial of Service (DDoS) attacks require little technical skill, they offer a […]
Exploit Forum - Les courtiers d'accès initiaux dans les États membres de l'OTAN
Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in (Exploit), IABs increasingly target entities within NATO member states, with research revealing recent activity in 21 of 31 countries. Additionally, access to organizations […]
Pleins feux sur les menaces : nouvelle frontière des exploits de l'IA
À mesure que l’apprentissage automatique (ML) et l’intelligence artificielle (IA) deviennent de plus en plus complexes, ils ouvrent de nouvelles possibilités aux organisations et aux acteurs de la menace. Au cours des quinze dernières années, les réseaux de neurones et les technologies d’apprentissage profond ont évolué à un rythme rapide. Au cours des quatre dernières années, depuis la sortie de GPT1 jusqu'à GPT4 aujourd'hui, les modèles d'IA ont évolué de […]