Vestas Shuts Down IT Systems After Cyberattack

Vestas Cyberattack

Vestas Wind Systems, the largest wind turbine manufacturer and installer in North America, was hit by a cyber security attack over the weekend forcing them to shut down several IT systems. Vestas is a service provider of wind turbines with 40,000 megawatts (MW) installed and over 36,000 MW in service in the United States and […]

Threat Actors Offer Millions for Zero-Days, Developers Discuss Exploit-as-a-Service

Exploit as a Service

Details about the parallel economy of vulnerability exploits occasionally emerge on underground forums, though hidden in private conversations, demonstrating the thickness of some threat actors’ wallets. Some adversaries claim multimillion-dollar budgets for purchasing zero-day exploits, however, those without such funds may still be able to use zero-days as a new ‘exploit-as-a-service’ concept becomes more common. […]

Breach Exposes Social Security Numbers of 100,000 California Pizza Kitchen Employees

Data Breach

California Pizza Kitchen (CPK) discovered a data breach exposing 100,000 current and former employees’ Social Security numbers. CPK, a U.S. pizza chain with over 250 locations, posted a notification confirming the incident. The company explained that they learned of the disruption to their systems on September 15 and worked quickly to secure their environment. On […]

6 Ways Businesses Are Impacted by Cybercrimes

Risk Assessment

With businesses storing internal and customer data on online networks, they become more vulnerable to cyberattacks and breaches. Dealing with cybercrimes increases the cost of cybersecurity, which can ultimately increase prices for consumers. According to business insurer Hiscox, companies lost almost $2 billion to cybercrime in 2019. Big companies with a strong online presence have […]

US and UK Issue Warning About Iranian Threat Actors Exploiting Microsoft Exchange and Fortinet

United States, United Kingdom, and Australian cybersecurity agencies issued a warning about an Iranian-backed threat group, APT, exploiting Microsoft Exchange ProxyShell and Fortinet vulnerabilities. The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC) issued the warning […]

Emotet Malware Returns and Is Rebuilding Its Botnet Using TrickBot

Emotet Malware Returns

In the past, the Emotet malware was considered the most widely distributed malware, spreading through spam campaigns and malicious attachments. Emotet infected devices then used them to perform spam campaigns and install other payloads, including QakBot (Qbot) and TrickBot malware. Emotet used the payloads to provide threat actors initial access to implement ransomware, including Ryuk, […]

Ransomware Attack Disrupts Comic Book Distribution Shipments

Ransomware Comic Distribution

A ransomware attack affected the Diamond Comic Distributors’ order processing systems and its internal communications platforms. Diamond Comic Distributors, a major comic book company located in Maryland, continues to struggle with planned shipments. The company explained that the ransomware attack delayed nationwide and global shipments. They have since resumed reorders and deliveries will arrive, just […]

How To Respond During A Ransomware Attack

Protect against ransomware

What is a ransomware attack? Ransomware attacks are becoming more commonplace as companies and organizations increasingly utilize digital networks and data storage in their daily operations. The United States Government’s Cybersecurity and Infrastructure Security Agency (CISA) defines ransomware as “malware designed to encrypt files on a device, rendering any files and the systems that rely […]

Moses Staff Threat Group Continues to Target Israel

Moses Staff Targets Israel

Moses Staff continues to acknowledge responsibility for a variety of attacks targeting Israeli organizations. The targets of these incidents include several high-profile engineering firms and the nation’s Defense Ministry. Moses Staff states openly the attacks and subsequent information leaks are politically motivated against what they claim is a “criminal Zionist government” and in support of […]

What is Ransomware?

Ransomware is

Ransomware is malware that uses encryption to hold victims’ information for ransom. Valuable data from ransomware victims are encrypted so they can’t access files, databases, or applications. Then threat actors demand a ransom in return for access to the data. Ransomware is developed to spread through the network targeting databases and file servers, resulting in […]