The threat actors do not have it all their own way – law enforcement does fight back. IN this case the FBI infiltrated the Dark Web assets of the BlackCat/AlphV ransomware gang getting an insight into how they work. Domians were seized and closed down disrupting the gangs operations and …
The National Cyber Security Centre releases the “most exploited” of 2022
The NCSC in collaboration with allies from around the world have released a list of those cyber vulnerabilities that were the most exploited by threat actors last year. NCSC and allies reveal most common cyber vulnerabilities exploited in 2022 – NCSC There are two main trends in the report: Defend …
Continue reading “The National Cyber Security Centre releases the “most exploited” of 2022”
International Disruption of Threat Infrastructure
International co-operation and excellent police work can have an impact on cyber security threats large and small. Here is an example of the FBI and US Justice Department closing and seizing domains associated with international DDoS attacks. Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown | Ars Technica …
Continue reading “International Disruption of Threat Infrastructure”
CISA security advisories
The UK’s National Cyber Security Centre has joined with the US government Cybersecurity and Infrastructure Security Agency (CISA), FBI and US National Security Agency (NSA) to issue a security advisory about vulnerabilities in Cisco devices: APT28 Exploits Known Vulnerability To Carry Out Reconnaissance and Deploy Malware on Cisco Routers | …
ESXiArgs Ransomware Recovery Advice
Following the discovery of a coding flaw in the ESXiArgs Ransomware, the US government Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a document outlining how to use the various scripts and processes to recovery data after an attack: CISA and FBI Release ESXiArgs Ransomware Recovery Guidance …