http://localhost:1200/cybersecurityventures/news/today - Success ✔️
```rss
Today's News
https://cybersecurityventures.com//today
Today's News - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:36 GMT5Finastra Data Breach: 400GB of Sensitive Client Data Exposed and Sold on Dark Web<p>Source: ClearPhish</p><br><p>London-based Finastra, one of the largest financial technology companies in the world, is investigating a data breach involving the unauthorized access and exfiltration of over 400 gigabytes of data from its internal file transfer platform. On Nov. 7, Finastra's security team detected suspicious activity on its internally hosted file transfer platform. The following day, a cybercriminal using the alias "abyss0" began selling large volumes of files allegedly stolen from Finastra's systems on the dark web. The data purportedly includes sensitive information from some of Finastra's largest banking clients. Finastra employs over 7,000 people and serves around 8,100 financial institutions globally, processing <a href="https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/">massive volumes</a> of digital files tied to financial transactions, according to Dataconomy. <a href="https://www.clearphish.ai/news/finastra-data-breach-400gb-client-data-dark-web">Full Story</a>
</p>
https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/
cybersecurityventures:673dceccc6034f02cf0660c4Thu, 21 Nov 2024 00:00:00 GMTTSA Cyber Disclosure Requirements Worry Natural Gas Companies<p>Source: The Wall Street Journal</p><br><p>The U.S. government is requiring too many intimate details of corporate cybersecurity plans, an executive representing natural-gas companies said at a congressional hearing Nov. 19. It is unclear whether the Transportation Security Administration or any U.S. agency can properly protect such sensitive information, said Kimberly Denbow, vice president of security and operations at the American Gas Association. In more than 300 pages of cybersecurity rules the TSA proposed this month, pipeline and railroad operators must disclose exacting details of their cybersecurity programs. This includes information on their network architecture, the types of cyber software they use, how they test their defenses, their incident-response plans and other details. <a href="https://www.wsj.com/articles/tsa-cyber-disclosure-requirements-worry-natural-gas-companies-c1cbe813">Full Story</a></p>
https://www.wsj.com/articles/tsa-cyber-disclosure-requirements-worry-natural-gas-companies-c1cbe813
cybersecurityventures:673f13fb27775303149eee44Thu, 21 Nov 2024 00:00:00 GMTU.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTMicrosoft Offers Hackers $4 Million For AI And Cloud Vulnerabilities<p>Source: Forbes</p><br><p>In a Nov. 19 announcement, Tom Gallagher, the vice president of engineering at the Microsoft Security Response Center, confirmed the latest move to expand the Microsoft bug bounty program with the launch of what’s it’s calling the <a href="https://www.microsoft.com/en-us/msrc/microsoft-zero-day-quest">Zero Day Quest</a>. The largest hacking event of its kind, according to Gallagher, Zero Day Quest will include $4 million of potential rewards for vulnerabilities impacting cloud and AI. Microsoft has published the rules of engagement for any hackers wanting to participate. Hackers who are unsure if it is safe to proceed, having discovered customer or Microsoft data, for example, should stop and contact bounty@microsoft.com immediately. <a href="https://www.forbes.com/sites/daveywinder/2024/11/20/come-and-hack-us-then-microsoft-says-putting-4-million-up-for-grabs/">Full Story</a></p>
https://www.microsoft.com/en-us/msrc/microsoft-zero-day-quest
cybersecurityventures:673f1921a0316f02b7eb0cb5Thu, 21 Nov 2024 00:00:00 GMTThe Philippine army is recruiting young tech civilians to fight cyberattacks<p>Source: Rest Of World</p><br><p>In response to tens of thousands of threats in recent years, the Philippine government has adopted a new five-year national cybersecurity plan, formed a defense network with the U.S. and Japan, and asked the military to reinforce the security of its systems. The Cyber Battalion, which was set up in 2020, was initially staffed by soldiers. The army then decided to actively recruit civilians. It targets young IT professionals who may be open to lower wages for greater job security and the pride of working for the nation, Lieutenant Colonel Ariel Alejandro, the Cyber Battalion’s commander, told Rest of World. The Cyber Battalion currently has a staff of about 120. The unit has so far hired about 70 civilian experts in their twenties and thirties. <a href="https://restofworld.org/2024/philippines-civilian-tech-cyber-attacks/">Full Story</a></p>
https://restofworld.org/2024/philippines-civilian-tech-cyber-attacks/
cybersecurityventures:673f1abeb25fd502bab01957Thu, 21 Nov 2024 00:00:00 GMTMichigan county rebounding from cyberattack, forced shutdown<p>Source: UpNorthLive ABC 7</p><br><p>The network for Wexford County, Mich. is slowly coming back online after a cyberattack two weeks ago. Wexford County Administrator Joe Porterfield said around Nov. 5 they received an email alert stating there was a network intrusion. All online services were then taken off-line for data to be analyzed for security. Officials are trying to get main office lines and email systems back up. Porterfield said the county has been working with the Michigan State Police Cyber Crimes Unit and the FBI. With some systems still offline, Porterfield recommends that anyone requesting services from the county to call ahead of time to make sure it is available. Wexford has a population of around 31,000. <a href="https://upnorthlive.com/news/local/wexford-county-computer-systems-returning-after-attempted-cyberattack-forced-shutdown">Full Story</a></p>
https://upnorthlive.com/news/local/wexford-county-computer-systems-returning-after-attempted-cyberattack-forced-shutdown
cybersecurityventures:673f1c645159440315f42836Thu, 21 Nov 2024 00:00:00 GMTPentagon and Microsoft Are Investigating Leak of Military Emails<p>Source: Bloomberg</p><br><p>The Defense Department and Microsoft Corp. are investigating an error that exposed at least a terabyte of military emails including personal information and conversations between officials, people familiar with the matter said, an episode that highlighted the security risk of moving sensitive Pentagon data to the cloud. The Pentagon’s Cyber Command has taken the lead on the investigation with Microsoft, which operates the Azure cloud-computing service that stored the data. Information on a U.S. Special Operations Command server was accessible without a password, said the people, who asked not to be identified. Investigators have no sign yet that the exposed data was accessed but were still working to assess the fallout from the leak. <a href="https://finance.yahoo.com/news/pentagon-microsoft-investigating-leak-military-203736994.html?fr=sycsrp_catchall">Full Story</a></p>
https://finance.yahoo.com/news/pentagon-microsoft-investigating-leak-military-203736994.html?fr=sycsrp_catchall
cybersecurityventures:673db38178101502eb249ef1Wed, 20 Nov 2024 00:00:00 GMTSlot Machine Operator International Game Reports Hacker Incident<p>Source: Bloomberg</p><br><p>London-based International Game Technology Plc, operator of popular slot machines in casinos, said an unauthorized third party gained access to certain of its systems. The company has experienced disruptions in portions of its internal IT systems and applications resulting from the incident, according to a filing Nov. 19. IGT activated its cybersecurity incident response plan and launched an investigation with the support of an external adviser. The company also took certain systems offline. The company said it’s in touch with customers and others. IGT delivers best-in-class products and services to legal, regulated public and commercial gaming operators across 100 countries on six continents. <a href="https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true
cybersecurityventures:673dc86a952de802c6d90083Wed, 20 Nov 2024 00:00:00 GMTRussian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTWarning on 500K French supermarket shoppers targeted in cyberattack<p>Source: The Connexion</p><br><p>French supermarket Auchan has warned shoppers to be vigilant after the personal details of more than 500,000 customers were targeted in a cyberattack. The attack has targeted the data of loyalty customers, specifically their names, email addresses, postal addresses, telephone numbers, date of birth, loyalty card number, and family composition (if provided), the retail chain said in an email to affected customers on Nov. 19. The chain urged customers to be “extremely vigilant due to the risk of fraudulent emails, text messages or calls”. <a href="https://www.connexionfrance.com/news/warning-after-data-of-500000-auchan-shoppers-is-targeted-in-cyber-attack/690319">Full Story</a></p>
https://www.connexionfrance.com/news/warning-after-data-of-500000-auchan-shoppers-is-targeted-in-cyber-attack/690319
cybersecurityventures:673dcc9cdff11c02b71727b7Wed, 20 Nov 2024 00:00:00 GMTTop US Cybersecurity Agency chief set to depart before Trump takes over<p>Source: TechRadar Pro</p><br><p>The Director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, is set to vacate her post before President Trump returns to office on Jan. 20 2025, throwing the future of the agency into doubt. CISA is responsible for critical infrastructure protection and improving the U.S. government’s protections against cybercriminals and state actors, who are increasingly targeting American agencies in order to exfiltrate data and disrupt services. Easterly held a number of security positions before taking the post as Director of CISA, such as senior director for counterterrorism on the National Security Council and Global Head of Cybersecurity for Morgan Stanley. <a href="https://www.techradar.com/pro/security/top-us-cybersecurity-agency-chief-set-to-depart-before-trump-takes-over">Full Story</a></p>
https://www.techradar.com/pro/security/top-us-cybersecurity-agency-chief-set-to-depart-before-trump-takes-over
cybersecurityventures:673dcd3ec6034f02cf061ccaWed, 20 Nov 2024 00:00:00 GMTNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems<p>Source: The Hacker News</p><br><p>Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. Some of the prominent sectors targeted by the cybercrime group include IT services, telecommunications, manufacturing, and healthcare. Like other ransomware crews, Helldown is known for leveraging data leak sites to pressure victims into paying ransoms by threatening to publish stolen data, a tactic known as double extortion. It's estimated to have attacked at least 31 companies within a span of three months. <a href="https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html">Full Story</a></p>
https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
cybersecurityventures:673f21d1f4da7b02e37f524aWed, 20 Nov 2024 00:00:00 GMTSpace tech giant Maxar confirms hacker accessed employees’ personal data<p>Source: TechCrunch</p><br><p>U.S. space technology and satellite giant Maxar has confirmed a data breach involving the personal information of its employees. In a <a href="https://oag.ca.gov/ecrime/databreach/reports/sb24-594961">notice</a> filed with California’s attorney general last week, Colorado-headquartered Maxar said a hacker using a Hong Kong-based IP address compromised its network on Oct. 4 to access files containing employee’s personal data. The breach was discovered Oct. 11. Maxar has 2,600 employees — more than half of which attained U.S. security clearances. The company was acquired for $6.4 billion last year by private equity giant Advent International. Maxar hasn’t said how many of its employees were impacted by the breach. <a href="https://techcrunch.com/2024/11/18/satellite-giant-maxar-confirms-hacker-accessed-employees-personal-data/">Full Story</a></p>
https://oag.ca.gov/ecrime/databreach/reports/sb24-594961
cybersecurityventures:673c6a1871f4b602cf57f9b0Tue, 19 Nov 2024 00:00:00 GMTU.S. Library of Congress Hacked By 'Adversary', Emails Accessed<p>Source: NBC News</p><br><p>The U.S. Library of Congress said hackers broke into its communications systems and were able to read its email correspondence with congressional offices for most of this year. In a private notification sent Nov. 15 to some congressional offices, the Library of Congress said that hackers “accessed email communications between congressional offices and some Library staff, including the Congressional Research Service.” The hackers had access from January until September. The Library of Congress, the nation's oldest federal cultural institution and the world’s largest library, offers a dedicated research staff for Congress. Last year, it gave congressional staffers more than 76,000 custom responses to inquiries. <a href="https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662">Full Story</a>
</p>
https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662
cybersecurityventures:673c6bd486081802f4527807Tue, 19 Nov 2024 00:00:00 GMTAI company tells SEC that $250,000 stolen in cyberattack<p>Source: The Record</p><br><p>An artificial intelligence company said a hacker breached its network and stole a $250,000 wire payment. iLearningEngines <a href="https://www.sec.gov/Archives/edgar/data/1835972/000121390024099394/ea0221424-8k_ilearning.htm">filed an 8-K form</a> with the U.S. Securities and Exchange Commission on Nov. 18 notifying the agency of a recent cybersecurity incident. “The ongoing investigation has revealed that a threat actor illegally accessed the Company’s environment and certain files on its network, misdirected a $250,000 wire payment, and deleted a number of email messages,” the company explained. iLearningEngines reported revenues of $135.5 million last quarter, and provides automation tools to more than 1,000 companies across several sectors including healthcare, education and retail. <a href="https://therecord.media/ai-company-loses-250000-in-bec-cyberattack">Full Story</a></p>
https://www.sec.gov/Archives/edgar/data/1835972/000121390024099394/ea0221424-8k_ilearning.htm
cybersecurityventures:673c6f2e86081802f4528bdbTue, 19 Nov 2024 00:00:00 GMTOne Million Websites Vulnerable To Dangerous Sitting Duck Cyberattacks<p>Source: Forbes</p><br><p>A cybersecurity threat known as a sitting duck exploit is thought to be putting more than one million websites at risk of attack, according to threat intelligence analysts. The fact that the attack methodology remains underreported could be the reason why Infoblox security researchers called the discovery of multiple hackers using the vulnerability across widespread cyberattacks eye-opening. A new Infoblox <a href="https://blogs.infoblox.com/threat-intelligence/dns-predators-hijack-domains-to-supply-their-attack-infrastructure/">report</a> has revealed how the threat has evolved into an ongoing attack methodology, the sitting duck vulnerability, and the risks it brings to organizations and consumers alike. <a href="https://www.forbes.com/sites/daveywinder/2024/11/19/1-million-websites-vulnerable-to-dangerous-sitting-duck-cyber-attacks/">Full Story</a></p>
https://blogs.infoblox.com/threat-intelligence/dns-predators-hijack-domains-to-supply-their-attack-infrastructure/
cybersecurityventures:673c709daff65a02a780c4ffTue, 19 Nov 2024 00:00:00 GMTMeta Loses German Court Fight Over Global Data Leak in 2021<p>Source: Bloomberg</p><br><p>Meta Platforms Inc. risks being on the hook for compensation claims from thousands of German users after it lost a top court ruling over the 2021 global leak of half a billion people’s private data. In a groundbreaking ruling, the Federal Court of Justice, Germany’s highest tribunal in civil matters, eased the standard of proof for Facebook users seeking compensation for the data theft. It’s enough to show they were victims of the leak, they don’t have to additionally prove they suffered in a particular way, the court said in a statement on the Nov. 18 judgment. The judgment will guide thousands of cases pending in the country. <a href="https://finance.yahoo.com/news/meta-loses-german-court-fight-142728757.html">Full Story</a></p>
https://finance.yahoo.com/news/meta-loses-german-court-fight-142728757.html
cybersecurityventures:673c71b586081802f452a2a3Tue, 19 Nov 2024 00:00:00 GMTBreach at B2B data broker DemandScience exposes over 100 million records<p>Source: ITPro</p><br><p>Over 100 million leaked records of business contact information listed on the dark web linked to B2B data aggregator DemandScience might have been stolen from a third party, the company has told ITPro. Formerly known as Pure Incubation, DemandScience is an AI-powered B2B demand generation company that helps organizations find potential customers for upcoming campaigns. The firm scrapes the public internet, building an expansive database that marketers and advertisers can use for lead generation. In February, a threat actor named ‘KryptonZambie’ listed Pure Incubation on BreachForums, claiming to have a stolen database containing 183 million records for sale. in August, KryptonZambie made the stolen data cache available for a few dollars, effectively leaking it for free. <a href="https://www.itpro.com/security/cyber-attacks/breach-at-b2b-data-broker-exposes-over-100-million-records">Full Story</a></p>
https://www.itpro.com/security/cyber-attacks/breach-at-b2b-data-broker-exposes-over-100-million-records
cybersecurityventures:673c73f6966d6902c0b15244Tue, 19 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTGermany's statistical office reports possible data leak<p>Source: DPA International</p><br><p>Germany's Federal Statistical Office (Destatis) has suspended a digital reporting system for authorities after indications of a possible data leak, it announced on Nov. 15. "The security authorities have been called in and the Federal Office for Information Security is analysing the situation," the office in the western city of Wiesbaden said. Germany's Interior Ministry referred to the case as a "cyber incident." A spokesman from the ministry said login details for a data reporting platform called IDEV, operated by Destatis and used to send data to the regional and federal government offices, as well as a data set of about 3.8 gigabytes with allegedly captured information, had been offered on a darknet forum. <a href="https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html">Full Story</a><span></span></p>
https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html
cybersecurityventures:673b2c4acd83ec02f56947beMon, 18 Nov 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/intrusion-daily-cyber-threat-alert - Success ✔️
```rss
Cyberattacks
https://cybersecurityventures.com//intrusion-daily-cyber-threat-alert
Cyberattacks - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:37 GMT5Finastra Data Breach: 400GB of Sensitive Client Data Exposed and Sold on Dark Web<p>Source: ClearPhish</p><br><p>London-based Finastra, one of the largest financial technology companies in the world, is investigating a data breach involving the unauthorized access and exfiltration of over 400 gigabytes of data from its internal file transfer platform. On Nov. 7, Finastra's security team detected suspicious activity on its internally hosted file transfer platform. The following day, a cybercriminal using the alias "abyss0" began selling large volumes of files allegedly stolen from Finastra's systems on the dark web. The data purportedly includes sensitive information from some of Finastra's largest banking clients. Finastra employs over 7,000 people and serves around 8,100 financial institutions globally, processing <a href="https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/">massive volumes</a> of digital files tied to financial transactions, according to Dataconomy. <a href="https://www.clearphish.ai/news/finastra-data-breach-400gb-client-data-dark-web">Full Story</a>
</p>
https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/
cybersecurityventures:673dceccc6034f02cf0660c4Thu, 21 Nov 2024 00:00:00 GMTSlot Machine Operator International Game Reports Hacker Incident<p>Source: Bloomberg</p><br><p>London-based International Game Technology Plc, operator of popular slot machines in casinos, said an unauthorized third party gained access to certain of its systems. The company has experienced disruptions in portions of its internal IT systems and applications resulting from the incident, according to a filing Nov. 19. IGT activated its cybersecurity incident response plan and launched an investigation with the support of an external adviser. The company also took certain systems offline. The company said it’s in touch with customers and others. IGT delivers best-in-class products and services to legal, regulated public and commercial gaming operators across 100 countries on six continents. <a href="https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true
cybersecurityventures:673dc86a952de802c6d90083Wed, 20 Nov 2024 00:00:00 GMTU.S. Library of Congress Hacked By 'Adversary', Emails Accessed<p>Source: NBC News</p><br><p>The U.S. Library of Congress said hackers broke into its communications systems and were able to read its email correspondence with congressional offices for most of this year. In a private notification sent Nov. 15 to some congressional offices, the Library of Congress said that hackers “accessed email communications between congressional offices and some Library staff, including the Congressional Research Service.” The hackers had access from January until September. The Library of Congress, the nation's oldest federal cultural institution and the world’s largest library, offers a dedicated research staff for Congress. Last year, it gave congressional staffers more than 76,000 custom responses to inquiries. <a href="https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662">Full Story</a>
</p>
https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662
cybersecurityventures:673c6bd486081802f4527807Tue, 19 Nov 2024 00:00:00 GMTGermany's statistical office reports possible data leak<p>Source: DPA International</p><br><p>Germany's Federal Statistical Office (Destatis) has suspended a digital reporting system for authorities after indications of a possible data leak, it announced on Nov. 15. "The security authorities have been called in and the Federal Office for Information Security is analysing the situation," the office in the western city of Wiesbaden said. Germany's Interior Ministry referred to the case as a "cyber incident." A spokesman from the ministry said login details for a data reporting platform called IDEV, operated by Destatis and used to send data to the regional and federal government offices, as well as a data set of about 3.8 gigabytes with allegedly captured information, had been offered on a darknet forum. <a href="https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html">Full Story</a><span></span></p>
https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html
cybersecurityventures:673b2c4acd83ec02f56947beMon, 18 Nov 2024 00:00:00 GMTHungary confirms hack of defense procurement agency<p>Source: The Record</p><br><p>Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.” On Nov. 14, the cybercrime group known as INC Ransomware claimed access to the agency's data and posted sample screenshots on its dark web portal. Prime Minister Viktor Orbán's chief of staff, Gergely Gulyás, attributed the attack to a "hostile foreign, non-state hacker group" without naming the group. Hungarian news outlet Magyar Hang <a href="https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482">reported</a> that the INC Ransomware gang breached the agency’s servers, downloading and encrypting all files. The hackers are reportedly demanding $5 million in ransom. Hungary is a member of the NATO alliance. <a href="https://therecord.media/hungary-defense-procurement-agency-hacked">Full Story</a>
</p>
https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482
cybersecurityventures:67372daeda9abc02fa3e74d7Fri, 15 Nov 2024 00:00:00 GMTUS confirms China-backed hackers breached telecom providers to steal wiretap data<p>Source: TechCrunch</p><br><p>The U.S. government has confirmed that hackers with links to China breached multiple U.S. telecommunication service providers to access the wiretap systems used by law enforcement to surveil Americans. In a <a href="https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications">joint statement</a> published Nov. 11, CISA and the FBI said they had uncovered “a broad and significant” cyber espionage campaign that saw PRC-affiliated actors compromise networks at “multiple telecommunications companies” in the U.S. CISA and the FBI did not name the breached organizations, but AT&T, Lumen (formerly CenturyLink) and Verizon are among the telecom providers whose networks were breached, <a href="https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b">according to The Wall Street Journal</a>. <a href="https://techcrunch.com/2024/11/14/us-confirms-china-backed-hackers-breached-telecom-providers-to-steal-wiretap-data/">Full Story</a>
</p>
https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications
cybersecurityventures:6735d25675490c02d77bd2f3Thu, 14 Nov 2024 00:00:00 GMTChinese hackers target Tibetan websites in malware attack<p>Source: Tech Xplore</p><br><p>A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan community in an attack meant to install malware on users' computers, <a href="https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites">according to Insikt Group</a>, the threat research division of Somerville, Mass.-based Recorded Future. The hack of the Tibet Post and Gyudmed Tantric University websites, both located in India, appears geared toward obtaining access to the computers of people visiting to obtain information on them and their activities. The sites were first compromised in May. Gyudmed Tantric University is a place of learning about Tibetan Buddhism, language, history and culture. The Tibet Post is known for promoting democracy, freedom of speech and for advocating Tibetan independence from China. <a href="https://techxplore.com/news/2024-11-chinese-hackers-tibetan-websites-malware.html">Full Story</a>
</p>
https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
cybersecurityventures:673486dbf6798402d2d9b851Wed, 13 Nov 2024 00:00:00 GMTNew England grocery stores, pharmacies impacted by cyberattack<p>Source: Boston.com</p><br><p>Stop & Shop locations have been the target of a cybersecurity attack, according to a Nov. 8 <a href="https://newsroom.aholddelhaize.com/ahold-delhaize-statement-on-ahold-delhaize-usa-cybersecurity-issue/">press release</a>. Parent company Ahold Delhaize detected a “cybersecurity issue” within their U.S. systems, notified law enforcement and began an investigation. It was unclear when the networks would be back up and running. The breach has affected pharmacies and e-commerce online, and delayed product deliveries. Hannaford Supermarkets and <a href="https://www.wral.com/story/food-lion-hit-by-cyberattack/21717747/">Food Lion</a>, both owned by Ahold Delhaize, experienced technical issues. The Netherlands-based Ahold Delhaize is one of the world’s largest food retail groups with 7,716 local stores, 402,000+ associates, and 63 million shoppers each week. <a href="https://www.boston.com/news/local-news/2024/11/11/new-england-grocery-stores-feeling-effects-of-cyber-attack/">Full Story</a>
</p>
https://newsroom.aholddelhaize.com/ahold-delhaize-statement-on-ahold-delhaize-usa-cybersecurity-issue/
cybersecurityventures:6733346fa6e10d02a40ba253Tue, 12 Nov 2024 00:00:00 GMTCyberattack temporarily blocks Israeli credit card payments<p>Source: The Times of Israel</p><br><p>An Israeli clearing company was targeted in a cyberattack on Nov. 10 leaving some people unable to use their credit cards to shop in stores for several hours. Channel 12 news and Army Radio both reported that an Iran-linked hacker group took responsibility for the attack, without citing sources or giving further details. In the incident, a DDoS attack targeted payment solution company Hyp, which is used by companies across Israel including the Maccabi health fund, taxi service Gett, food ordering app Wolt, and public transportation payment systems Rav Kav Online and Hop-On. The attack also interfered with some operations on Bit, the popular digital payment app operated by Bank Hapoalim, similar to the US-based Venmo. <a href="https://www.timesofisrael.com/ddos-cyberattack-temporarily-blocks-israeli-credit-card-payments/">Full Story</a></p>
https://www.timesofisrael.com/ddos-cyberattack-temporarily-blocks-israeli-credit-card-payments/
cybersecurityventures:6731e0534ea7350315ebc5acMon, 11 Nov 2024 00:00:00 GMTOutages impact Washington state courts after ‘unauthorized activity’ detected on network<p>Source: The Record</p><br><p>A potential cyber intrusion is causing outages within court systems across the state of Washington this week. On Nov. 4, the Washington State Administrative Office of the Courts (AOC) <a href="https://www.facebook.com/washingtoncourts/posts/989279419892942">warned</a> state residents that it “recently identified unauthorized activity on the Washington Courts network.” The outages have affected courts in the counties of Thurston, Monroe, Renton, Puyallup, Bainbridge, King, Pierce, Whatcom, and Lewis as well as municipal courts in several cities. “We have taken immediate action to secure critical systems and are working to safely restore service. Please be advised that there will be intermittent impacts to accessibility of our public website and systems in the coming days as we continue to restore services,” the AOC said. <a href="https://therecord.media/outages-washington-courts-cyber-activity">Full Story</a>
</p>
https://www.facebook.com/washingtoncourts/posts/989279419892942
cybersecurityventures:672defac0186d1029c87664dFri, 08 Nov 2024 00:00:00 GMTLos Angeles housing authority admits data breach following ransomware attack<p>Source: TechRadar Pro</p><br><p>The Housing Authority of the City of Los Angeles (HACLA) has suffered its second ransomware attack in as many years. Threat actors known as Cactus added HACLA to its data leak website, claiming to have stolen 891 gigabytes of files from the organization. The archives reportedly include, "personal Identifiable Information, actual database backups, financial documents, executives\employees personal data, customer personal information, corporate confidential data and correspondence.” A small sample was posted as proof of the claims, and soon after, <a href="https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/">HACLA confirmed the news to BleepingComputer</a> Nov. 1, saying it was currently investigating the incident. <a href="https://www.techradar.com/pro/security/la-housing-authority-admits-data-breach-following-ransomware-attack">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/
cybersecurityventures:672ca8146951f40c2a40eb65Thu, 07 Nov 2024 00:00:00 GMTSerco tracking devices on UK prison vans disabled after cyberattack<p>Source: Financial Times</p><br><p>Serco’s tracking devices and panic alarms on prison vans were disabled after a cyberattack last week on a service provider for the UK outsourcing giant. In an incident that also affected the operations of international express mail courier DHL, hackers targeted AIM-listed Microlise, whose tracking software provides protection for Serco employees and prisoners, ensuring their whereabouts are known at all times. Microlise notified the London Stock Exchange about the attack on Oct. 31. Serco operates prisoner escort and custody services for the Ministry of Justice. It is the company’s largest services contract of this kind with more than 300,000 prisoner movements under its charge each year. <a href="https://www.ft.com/content/84753e89-b769-42fb-ac85-a76b91c3fe1f">Full Story</a></p>
https://www.ft.com/content/84753e89-b769-42fb-ac85-a76b91c3fe1f
cybersecurityventures:672b55f3b7f2e40326220050Wed, 06 Nov 2024 00:00:00 GMTSchneider Electric Investigates Cyber Incident. Hacker Claimed To Steal 40GB Of Data<p>Source: CRN</p><br><p>Schneider Electric said in a statement to CRN Nov. 4 that it was “investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms.” The platform is hosted inside of an “isolated” environment, according to Schneider Electric, a French multi-national technology provider in segments including power management and industrial automation. BleepingComputer reports that <a href="https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/">a threat actor claimed to steal 40GB of data</a> from the company's JIRA server. On Nov. 3, a threat actor known as "Grep" <a href="https://x.com/grepcn/status/1853089027777261941">taunted</a> Schneider Electric on X, indicating they had breached its systems. <a href="https://www.crn.com/news/security/2024/schneider-electric-investigating-security-incident-after-reported-hacker-claims">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
cybersecurityventures:672a081566237f02a3372d37Tue, 05 Nov 2024 00:00:00 GMTCalifornia court suffering from tech outages after cyberattack<p>Source: The Record</p><br><p>The San Joaquin County Superior Court said nearly all of its digital services have been knocked offline due to a cyberattack that began last week. The court first <a href="https://www.facebook.com/SJSuperiorCourt/posts/933901012105934">warned</a> the county’s nearly 800,000 residents of technology issues on Oct. 30 before <a href="https://www.facebook.com/SJSuperiorCourt/posts/934737472022288">admitting</a> that it was a cybersecurity incident the next day. The attack knocked out all of the court’s phone and fax services, websites containing juror reporting instructions, the e-filing platform, credit card payment processing and more. Some jurors scheduled to serve were excused. Cybersecurity experts have been hired to support the court’s efforts to remediate the issue and investigate the incident. The court does not have a timeline for when systems will be restored. <a href="https://therecord.media/california-court-suffering-from-tech-outages-cyberattack">Full Story</a></p>
https://www.facebook.com/SJSuperiorCourt/posts/933901012105934
cybersecurityventures:6728c11d10c02e02b4f0917fMon, 04 Nov 2024 00:00:00 GMTChinese state-backed hackers breached 20 Canadian government networks over four years, agency warns<p>Source: The Record</p><br><p>Chinese government-backed hackers have compromised at least 20 Canadian government networks over the last four years, Canada’s top cyber agency said Oct. 30. Calling the threat from China in cyberspace “second to none,” the Canadian Centre for Cyber Security (CCCS) said Beijing’s operations “serve high-level political and commercial objectives, including espionage, IP theft, malign influence, and transnational repression.” Summarized in its National Cyber Threat Assessment 2025-2026, a biennial <a href="https://www.cyber.gc.ca/sites/default/files/national-cyber-threat-assessment-2025-2026-e.pdf">report</a> intended to warn the public of threats and to guide cybersecurity strategy, the CCCS said Canadian critical infrastructure, industry — including the research and development sector — and government agencies have all been targeted by Chinese actors. <a href="https://therecord.media/canada-20-government-agencies-hacked-china-last-four-years">Full Story</a></p>
https://www.cyber.gc.ca/sites/default/files/national-cyber-threat-assessment-2025-2026-e.pdf
cybersecurityventures:6724b1526826a00303b8aafaFri, 01 Nov 2024 00:00:00 GMTPeru's Interbank reports data breach potentially affecting 2M+ customers<p>Source: El Popular</p><br><p>Interbank acknowledged a massive hack in its banking system affecting more than 2 million customers on Oct. 30. The Peru-based bank reported that an unauthorized person accessed its database, exposing the personal information of some clients, and that a specialized team is working intensively to resolve the incident and restore the operation of its main service channels. Interbank states that after completing a technical review, all operations will be reactivated immediately. "It is worrying that a bank of that size has reacted so poorly in terms of prevention, reaction and mitigation of the damage done," Carlos Zuñiga, president of the Consumer Defense Association Elegir Perú, <a href="https://elcomercio.pe/economia/peru/interbank-sobre-filtracion-de-datos-de-usuarios-garantizamos-la-seguridad-de-sus-depositos-y-productos-financieros-i-ultimas-noticia/?ref=ecr">told El Comercio</a>. <a href="https://elpopular.pe/actualidad/2024/10/30/interbank-hacker-revela-el-motivo-por-el-cual-filtro-los-datos-de-usuarios-el-banco-no-ha-cumplido-con-sus-promesas-1594590">Full Story</a>
</p>
https://elcomercio.pe/economia/peru/interbank-sobre-filtracion-de-datos-de-usuarios-garantizamos-la-seguridad-de-sus-depositos-y-productos-financieros-i-ultimas-noticia/?ref=ecr
cybersecurityventures:67236e1a1adf2102d0df62d9Thu, 31 Oct 2024 00:00:00 GMTMoneyGram replaces CEO weeks after massive customer data breach<p>Source: TechCrunch</p><br><p>Money transfer giant MoneyGram has replaced its chief executive less than a month after confirming that hackers stole reams of customers’ personal information and transaction records in a data breach. In a statement Oct. 28, MoneyGram said it appointed Anthony Soohoo as the company’s chief executive with immediate effect. Soohoo replaces Alex Holmes, who joined MoneyGram in 2009 and served as its CFO, then COO, before being appointed CEO and chairman in 2016. Holmes’ removal comes in the same month that the company confirmed it had lost an unspecified amount of personal customer information during its <a href="https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/">recent cyberattack</a>. The company has yet to describe the nature of the attack, which sparked in a week-long outage of its money transfer service. <a href="https://techcrunch.com/2024/10/29/moneygram-replaces-ceo-weeks-after-massive-customer-data-breach/">Full Story</a></p>
https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/
cybersecurityventures:672213c735284e02fbddc4d7Wed, 30 Oct 2024 00:00:00 GMTHacker group targets end-of-life pharmacy provider<p>Source: TechInformed</p><br><p>OnePoint Patient Care, an Arizona-based hospice pharmacy serving over 40,000 patients per day, has informed customers about a data breach impacting personal information. OnePoint said it first detected suspicious activity on its network in early August. A later investigation revealed that by this point, the attackers had already obtained files containing personal information from the pharmacy’s systems, including names, residence information, medical records, and prescription and diagnosis information. OPPC told the U.S. Department of Health and Human Services that the data breach impacted over 795,000 people. Inc Ransomware, an extortion operation, has taken credit for the attack, listing the company on its Tor-based leak website. <a href="https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/">Full Story</a></p>
https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/
cybersecurityventures:6720c26c63a259028cc22e37Tue, 29 Oct 2024 00:00:00 GMTRansomHub gang allegedly behind attack on Mexican airport operator<p>Source: The Record</p><br><p>A hacking group recently spotlighted by U.S. agencies said it is responsible for an attack targeting an operator of 13 airports across Mexico. Grupo Aeroportuario del Centro Norte <a href="https://www.oma.aero/assets/005/6312.pdf">announced</a> Oct. 18 that a cyber incident forced its IT team to turn to backup systems in an effort to continue running the airports it controls across central and northern Mexico. Known colloquially as OMA, the company runs airports in Monterrey and other major Mexican cities, handling more than 19 million passengers so far this year. On Oct. 24, the RansomHub operation claimed to be responsible for the incident, and threatened to leak 3 terabytes of stolen data if an undisclosed ransom is not paid. <a href="https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator">Full Story</a></p>
https://www.oma.aero/assets/005/6312.pdf
cybersecurityventures:671f6cce1698c502bafb63e3Mon, 28 Oct 2024 00:00:00 GMTChange Healthcare hack affects over 100M, largest-ever US healthcare breach<p>Source: TechCrunch</p><br><p>More than 100 million individuals had their private health information stolen during the ransomware attack on Change Healthcare in February, a cyberattack that caused months of unprecedented outages and widespread disruption across the U.S. healthcare sector. This is the first time that UnitedHealth Group (UHG), the U.S. health insurance provider that owns the health tech company, has put a number of affected individuals to the data breach, after previously saying it anticipated the breach to include data on a “substantial proportion of people in America.” The U.S. Department of Health and Human Services <a href="https://www.documentcloud.org/documents/25250169-change-healthcare-breach">first reported the updated number</a> on its data breach portal on Oct. 24. <a href="https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/">Full Story</a></p>
https://www.documentcloud.org/documents/25250169-change-healthcare-breach
cybersecurityventures:671b7b510ed19003054c7bbcFri, 25 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/ransomware-minute - Success ✔️
```rss
Ransomware
https://cybersecurityventures.com//ransomware-minute
Ransomware - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:38 GMT5Russian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems<p>Source: The Hacker News</p><br><p>Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. Some of the prominent sectors targeted by the cybercrime group include IT services, telecommunications, manufacturing, and healthcare. Like other ransomware crews, Helldown is known for leveraging data leak sites to pressure victims into paying ransoms by threatening to publish stolen data, a tactic known as double extortion. It's estimated to have attacked at least 31 companies within a span of three months. <a href="https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html">Full Story</a></p>
https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
cybersecurityventures:673f21d1f4da7b02e37f524aWed, 20 Nov 2024 00:00:00 GMTHungary confirms hack of defense procurement agency<p>Source: The Record</p><br><p>Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.” On Nov. 14, the cybercrime group known as INC Ransomware claimed access to the agency's data and posted sample screenshots on its dark web portal. Prime Minister Viktor Orbán's chief of staff, Gergely Gulyás, attributed the attack to a "hostile foreign, non-state hacker group" without naming the group. Hungarian news outlet Magyar Hang <a href="https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482">reported</a> that the INC Ransomware gang breached the agency’s servers, downloading and encrypting all files. The hackers are reportedly demanding $5 million in ransom. Hungary is a member of the NATO alliance. <a href="https://therecord.media/hungary-defense-procurement-agency-hacked">Full Story</a>
</p>
https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482
cybersecurityventures:67372daeda9abc02fa3e74d7Fri, 15 Nov 2024 00:00:00 GMTYMCA of Central Florida suffers data breach, nearly 12,000 affected<p>Source: Orlando Inno</p><br><p>The YCMA of Central Florida suffered a data breach in May, according to the nonprofit's filing. The breach exposed sensitive information of thousands of local members, prompting new security measures and other actions. <a href="https://www.comparitech.com/news/florida-ymca-notifies-12k-people-of-data-breach-compromising-ssns/">Nearly 12,000 people were notified of the breach</a> that compromised the following info: Names; Social Security numbers; Financial account numbers; Personal health information; USCIS numbers; Passport numbers; Dates of birth; Driver’s license numbers; and Mailing addresses; Ransomware gang LockBit claimed responsibility for the breach in early June. It posted what it says are scans of IDs and other documents as proof of its claim. <a href="https://www.bizjournals.com/orlando/inno/stories/news/2024/11/13/ymca-central-florida-data-breach-credit-monitoring.html">Full Story</a></p>
https://www.comparitech.com/news/florida-ymca-notifies-12k-people-of-data-breach-compromising-ssns/
cybersecurityventures:6735da2aba956f02a122b45eThu, 14 Nov 2024 00:00:00 GMTTexas Oilfield system supplier Newpark Resources hit by ransomware<p>Source: Cybernews</p><br><p>Newpark Resources, a supplier of fluid systems and industrial solutions to the oil and gas industry, disclosed a ransomware incident that caused disruptions. In a filing with the US Securities and Exchange Commission, the company said it detected a ransomware cybersecurity incident on Oct. 29.. An unauthorized third party gained access to internal information systems. “Upon detection, the Company activated its cybersecurity response plan and launched an investigation internally with the support of external advisors to assess and to contain the threat,” the Newpark’s <a href="https://www.sec.gov/Archives/edgar/data/71829/000007182924000111/nr-20241029.htm">statement</a> reads. <a href="https://cybernews.com/security/newpark-resources-hit-by-ransomware/">Full Story</a></p>
https://www.sec.gov/Archives/edgar/data/71829/000007182924000111/nr-20241029.htm
cybersecurityventures:672df119b94aa103215454c9Fri, 08 Nov 2024 00:00:00 GMTLos Angeles housing authority admits data breach following ransomware attack<p>Source: TechRadar Pro</p><br><p>The Housing Authority of the City of Los Angeles (HACLA) has suffered its second ransomware attack in as many years. Threat actors known as Cactus added HACLA to its data leak website, claiming to have stolen 891 gigabytes of files from the organization. The archives reportedly include, "personal Identifiable Information, actual database backups, financial documents, executives\employees personal data, customer personal information, corporate confidential data and correspondence.” A small sample was posted as proof of the claims, and soon after, <a href="https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/">HACLA confirmed the news to BleepingComputer</a> Nov. 1, saying it was currently investigating the incident. <a href="https://www.techradar.com/pro/security/la-housing-authority-admits-data-breach-following-ransomware-attack">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/
cybersecurityventures:672ca8146951f40c2a40eb65Thu, 07 Nov 2024 00:00:00 GMTINTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime<p>Source: The Hacker News</p><br><p>INTERPOL on Nov. 5 said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from Apr. 1 to Aug. 31, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 percent were taken down and 59 servers were seized," INTERPOL said. "Additionally, 43 electronic devices, including laptops, mobile phones and hard disks were seized." The actions also led to the arrest of 41 individuals, with 65 others still under investigation. <a href="https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html">Full Story</a></p>
https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html
cybersecurityventures:672b592ca17ab302ac9b5927Wed, 06 Nov 2024 00:00:00 GMTRural Georgia Hospital Hit By Ransomware<p>Source: WALB News 10</p><br><p>A ransomware attack is impacting the Electronic Health Record system at the Memorial Hospital and Manor in Bainbridge, Ga. according to a Facebook post. “While we believe this issue will not impact either the level or the quality of care we provide to our patients, we want to be fully transparent regarding this situation.” The attack was discovered early Nov. 2 when employees were seeking notifications of potential risks found by their virus protection software. The hospital said they are currently evaluating their plan for restoration and recovery. The 80-bed community hospital and 107-bed long-term care facility is owned and operated by the Hospital Authority of the City of Bainbridge and Decatur County. <a href="https://www.walb.com/2024/11/03/memorial-hospital-manor-investigating-cyber-attack/">Full Story</a>
</p>
https://www.walb.com/2024/11/03/memorial-hospital-manor-investigating-cyber-attack/
cybersecurityventures:672a0f0166237f02a337e676Tue, 05 Nov 2024 00:00:00 GMTHacker group targets end-of-life pharmacy provider<p>Source: TechInformed</p><br><p>OnePoint Patient Care, an Arizona-based hospice pharmacy serving over 40,000 patients per day, has informed customers about a data breach impacting personal information. OnePoint said it first detected suspicious activity on its network in early August. A later investigation revealed that by this point, the attackers had already obtained files containing personal information from the pharmacy’s systems, including names, residence information, medical records, and prescription and diagnosis information. OPPC told the U.S. Department of Health and Human Services that the data breach impacted over 795,000 people. Inc Ransomware, an extortion operation, has taken credit for the attack, listing the company on its Tor-based leak website. <a href="https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/">Full Story</a></p>
https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/
cybersecurityventures:6720c26c63a259028cc22e37Tue, 29 Oct 2024 00:00:00 GMTFour REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions<p>Source: The Hacker News</p><br><p>Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant <a href="https://www.kommersant.ru/doc/7263987">reported</a> that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov guilty of illegal circulation of means of payment. Puzyrevsky and Khansvyarov have also been found guilty of using and distributing malware. Zaets and Malozemov were sentenced to 4.5 and 5 years in prison. Khansvyarov and Puzyrevsky received a jail term of 5.5 and 6 years, respectively. <a href="https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html">Full Story</a></p>
https://www.kommersant.ru/doc/7263987
cybersecurityventures:671f6db1764f4702e43b13d7Mon, 28 Oct 2024 00:00:00 GMTChange Healthcare hack affects over 100M, largest-ever US healthcare breach<p>Source: TechCrunch</p><br><p>More than 100 million individuals had their private health information stolen during the ransomware attack on Change Healthcare in February, a cyberattack that caused months of unprecedented outages and widespread disruption across the U.S. healthcare sector. This is the first time that UnitedHealth Group (UHG), the U.S. health insurance provider that owns the health tech company, has put a number of affected individuals to the data breach, after previously saying it anticipated the breach to include data on a “substantial proportion of people in America.” The U.S. Department of Health and Human Services <a href="https://www.documentcloud.org/documents/25250169-change-healthcare-breach">first reported the updated number</a> on its data breach portal on Oct. 24. <a href="https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/">Full Story</a></p>
https://www.documentcloud.org/documents/25250169-change-healthcare-breach
cybersecurityventures:671b7b510ed19003054c7bbcFri, 25 Oct 2024 00:00:00 GMTHenry Schein breach probe reveals massive scope, 5X+ more than initial calculations<p>Source: Cybernews</p><br><p>Melville, N.Y.-based Henry Schein, a dental and medical supplies giant, finalized a lengthy inquiry into a devastating 2023 ransomware attack, revealing its massive scope. The incursion was carried out by the now-defunct ALPHV/BlackCat ransomware cartel, a once prominent Russia-linked gang whose damages ballooned to tens of millions of dollars worldwide. During the attack, cybercrooks claimed that they’d stolen a whopping 35 TB of data in total, including sensitive details such as patient medical histories and treatment and insurance details. The investigation, which Henry Schein claims “required substantial time and resources,” revealed that over 166,000 individuals were exposed in the attack, 5.5 times more than initial calculations said. <a href="https://cybernews.com/privacy/henry-schein-breach-probe-surges-victim-count/">Full Story</a></p>
https://cybernews.com/privacy/henry-schein-breach-probe-surges-victim-count/
cybersecurityventures:671b7cbb0263af03155b7533Fri, 25 Oct 2024 00:00:00 GMTRansomware gang stoops to new low, targets prominent nonprofit for disabled people<p>Source: The Record</p><br><p>A notorious ransomware gang previously responsible for attacks on multiple hospitals has now claimed a new victim: disability nonprofit Easterseals. The Rhysida ransomware group stooped to new lows this week when it attempted to extort $1.3 million from the organization, which provides support to disabled children, seniors, military veterans and others. Rhysida ransomware actors posted the organization on its leak site this week, demanding 20 bitcoin by Oct. 30. The nonprofit is one of the oldest disability-focused organizations in the U.S., serving more than 1.5 million people across the country and providing additional services to 100,000 physicians who care for those in need. <a href="https://therecord.media/easterseals-central-illinois-data-breach">Full Story</a></p>
https://therecord.media/easterseals-central-illinois-data-breach
cybersecurityventures:671a287310380102ce8ba44bThu, 24 Oct 2024 00:00:00 GMTNidec confirms ransomware attack leaked company data online<p>Source: TechRadar Pro</p><br><p>Threat actors breached Nidec Corporation earlier this year and have now leaked stolen data on the dark web. In an announcement, the company explained that a hacker stole valid VPN account information from a Nidec employee, and used it to access a server holding sensitive information consisting of 50,694 files, including internal documents, letters from business partners, documents related to green procurement, labor safety and health policies, business documents (purchase orders, invoices, receipts), contracts, and more. No ransom has been paid. Nidec Corporation is a Japanese multinational company specializing in electric motor technology, producing a wide range of motors for applications such as automotive, industrial, and home appliances. <a href="https://www.techradar.com/pro/security/nidec-confirms-ransomware-attack-leaked-company-data-online">Full Story</a>
</p>
https://www.techradar.com/pro/security/nidec-confirms-ransomware-attack-leaked-company-data-online
cybersecurityventures:6718d9a424142a03135b3430Wed, 23 Oct 2024 00:00:00 GMT93K People Impacted By Transak Data Breach<p>Source: CoinDesk</p><br><p>A crypto industry employee's use of a laptop for non-work purposes is reportedly at the heart of a data breach involving some 93,000 unique users – and now a ransomware group is attempting to negotiate with the company that was targeted. Transak, an "onramp" used by a number of popular blockchain companies to allow customers to buy cryptocurrencies, disclosed in a <a href="https://transak.com/blog/transak-security-incident-oct-2024">blog post</a> on Oct. 21 that it had fallen victim to a data breach. According to Transak, the leaked data was limited to "names" and "basic identity information." In an interview with CoinDesk, Transak CEO Sami Start said that 93,000 people were impacted by the breach, which included passports, ID cards and selfies used by customers to verify their identities with crypto financial products. <a href="https://www.coindesk.com/tech/2024/10/21/crypto-on-ramp-service-transak-targeted-in-data-breach/">Full Story</a></p>
https://transak.com/blog/transak-security-incident-oct-2024
cybersecurityventures:67178b91c8cf6d030138f4c1Tue, 22 Oct 2024 00:00:00 GMTRhode Island Students’ Sensitive Data Exposed in Cyberattack<p>Source: The 74</p><br><p>Sexual misconduct allegations involving both students and teachers, children’s special education records and their vaccine histories are readily available online after the Providence, R.I. school district fell victim to a <a href="https://rhodeislandcurrent.com/2024/09/18/the-clock-is-running-on-ransomware-attack-against-providence-schools/">cyberattack last month</a>. A ransomware gang uploaded those and other sensitive student information to an instant messaging service after Providence Public Schools failed to pay their $1 million extortion demand, an investigation by The 74 revealed. An analysis of the stolen files — posted by the threat actors to the messaging platform Telegram — indicates the 217 gigabyte data leak includes students’ specific special education accommodations and medications. Other files offer detailed insight into district investigations into sexual misconduct allegations naming educators and students. <a href="https://www.yahoo.com/news/providence-students-sensitive-data-exposed-103000777.html">Full Story</a></p>
https://rhodeislandcurrent.com/2024/09/18/the-clock-is-running-on-ransomware-attack-against-providence-schools/
cybersecurityventures:67124396ffcff202b655764aFri, 18 Oct 2024 00:00:00 GMTBritish intelligence services to protect all UK schools from ransomware attacks<p>Source: The Record</p><br><p>Schools across the UK are being encouraged to sign up for a free service developed inside the country’s security and intelligence services that would help protect them from ransomware attacks and other threats. Cyberattacks affecting schools can pose a severe risk to children, not only in disrupting their access to education and the other services schools provide, but also by publishing sensitive documents regarding at-risk students in extortion attempts. The National Cyber Security Centre (NCSC) — a part of the signals and cyber intelligence agency GCHQ — <a href="https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions">announced</a> that it was rolling out its PDNS (Protective Domain Name System) for Schools service nationally. <a href="https://therecord.media/uk-pdns-schools-cyberdefense-intelligence-services">Full Story</a></p>
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions
cybersecurityventures:670efc0b0d259e03061a3671Tue, 15 Oct 2024 00:00:00 GMTHackers demand $1.5M for patient data after Colorado health system breach<p>Source: Becker's Health IT</p><br><p>Axis Health System identified a cyberattack affecting operations, including its primary care patient portal, according to the health system's website. Axis, a network of 13 behavioral health facilities in Colorado, followed incident response protocol after identifying the attack and its investigation is ongoing. The system has not confirmed whether patient data was affected. The Rhysida ransomware gang claimed responsibility for the attack and requested $1.58 million in bitcoin to avoid having patient data exposed, according to an Oct. 10 <a href="https://x.com/H4ckManac/status/1844453256120107190">post on X</a>. The hackers are giving Axis until Oct. 17 to pay the ransom before selling the data. <a href="https://www.beckershospitalreview.com/cybersecurity/hackers-demand-1-5m-for-patient-data-after-colorado-system-breach.html">Full Story</a></p>
https://x.com/H4ckManac/status/1844453256120107190
cybersecurityventures:670a5637f6e8d8031735b18aSat, 12 Oct 2024 00:00:00 GMTThe Australian government has introduced new cybersecurity laws<p>Source: The Conversation</p><br><p>The Albanese government Oct. 9 introduced long-awaited legislation to parliament which is set to revolutionize Australia’s cybersecurity preparedness. The legislation, if passed, will be Australia’s first standalone cybersecurity act. It’s aimed at protecting businesses and consumers from the rising tide of cybercrime. Under the new law, victims of ransomware attacks who make payments must report the payment to authorities. This will help the government track cybercriminal activities and understand how much money is being lost to ransomware. The legislation will also introduce new minimum cybersecurity standards for all smart devices, such as watches, televisions, speakers and doorbells. <a href="https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889">Full Story</a></p>
https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889
cybersecurityventures:67065e42294da002f15c4f4bWed, 09 Oct 2024 00:00:00 GMTU.S. agency warns against Trinity ransomware targeting health sector<p>Source: Cointelegraph</p><br><p>A U.S. government agency warned about Trinity ransomware, known for extorting crypto from its victims in exchange for not leaking data accessed via several attack vectors. On Oct. 4, the US Health Sector Cybersecurity Coordination Center (HC3) <a href="https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf">published</a> a profile of Trinity ransomware, a threat actor that targets sensitive data. The attackers use phishing emails, malicious websites and software vulnerabilities to trick victims into installing the ransomware on their computers. It then searches the computer for sensitive information, collects it, and sends it to hackers. The ransomware also encrypts the victim’s files with an algorithm, rendering them useless. <a href="https://cointelegraph.com/news/us-agency-warns-trinity-ransomware-targeting-institutions">Full Story</a></p>
https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf
cybersecurityventures:67066347ea040d029397281bWed, 09 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/cryptocrime - Success ✔️
```rss
Cryptocrime
https://cybersecurityventures.com//cryptocrime
Cryptocrime - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:39 GMT5U.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTHacker who stole and laundered billions in bitcoin with wife’s help gets 5-year sentence<p>Source: Reuters</p><br><p>A New York technology entrepreneur was sentenced to five years in prison on Thursday after pleading guilty last year to laundering funds stolen from Bitfinex, one of the world’s largest cryptocurrency exchanges, with the help of his wife. Ilya Lichtenstein, 35, hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques, and stole about 120,000 bitcoin, the Justice Department said in a statement. He and his wife Heather Morgan, who used the hip-hop alias “Razzklekhan” to promote her music, were arrested in Feb. 2022. <a href="https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/">Full Story</a></p>
https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/
cybersecurityventures:6737200286c94702d3fd0b32Fri, 15 Nov 2024 00:00:00 GMTChinese national faces 20 years in US prison for laundering pig-butchering proceeds<p>Source: The Record</p><br><p>One of the ringleaders of a <a href="https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams">scheme to launder millions stolen through cryptocurrency investment scams</a> pleaded guilty in a California courtroom Nov. 12. Daren Li, 41, faces up to 20 years in prison for taking part in an operation that laundered more than $73 million stolen from people duped by so-called “pig-butchering” scams. Pig butchering typically involves a scammer forming a relationship with a victim on messaging platforms before persuading them to make fraudulent investments. Li is a dual citizen of China and St. Kitts and Nevis, as well as a resident of both Cambodia and the United Arab Emirates. He pleaded guilty to one count of conspiracy to commit money laundering. <a href="https://therecord.media/chinese-national-faces-20-years-money-laundering-pig-butchering">Full Story</a></p>
https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams
cybersecurityventures:6735db37be012e029d73a1e6Thu, 14 Nov 2024 00:00:00 GMTChinese official ruined by crypto investments gets life in prison for selling state secrets<p>Source: The Record</p><br><p>Chinese authorities announced Nov. 8 that a public servant who found himself with large debts due to failed cryptocurrency investments had been sentenced to life in prison for selling state secrets to an unidentified foreign intelligence agency. According to a <a href="https://baijiahao.baidu.com/s?id=1815140973005200476">post on Baidu</a> by the Ministry of State Security (MSS) — the Chinese Communist Party’s secret police and intelligence agency — the official, pseudonymised as Wang Moumou, was recruited after posting online about his financial difficulties. According to the MSS, Wang provided “top-secret and confidential national information to foreign parties,” for which he received “over 1 million yuan ($138,000) in espionage funds through methods such as virtual currency recharge and trading.” <a href="https://therecord.media/chinese-official-ruined-by-crypto-investments-sold-state-secrets">Full Story</a></p>
https://baijiahao.baidu.com/s?id=1815140973005200476
cybersecurityventures:67348d60ab35b002d0d25358Wed, 13 Nov 2024 00:00:00 GMTFounder of Cryptocurrency Financial Services Firm "Gotbit" Indicted for Market Manipulation and Fraud Conspiracy<p>Source: U.S. Department of Justice</p><br><p>A Russian national residing in Portugal has been indicted for his role in a wide-ranging conspiracy to manipulate cryptocurrency markets on behalf of client cryptocurrency companies. Aleksei Andriunin, 26, was charged with wire fraud and conspiracy to commit market manipulation and wire fraud in a superseding indictment. According to court documents, Andriunin was Gotbit’s Founder and CEO. Gotbit was a well-known “market maker” in the cryptocurrency industry. It is alleged that between 2018 and 2024, Gotbit provided market manipulation services to create artificial trading volume for multiple cryptocurrency companies, including companies located in the U.S. <a href="https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and">News Release</a></p>
https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and
cybersecurityventures:67349837608f8f02e9318900Wed, 13 Nov 2024 00:00:00 GMTFTX sues Binance for $1.76B in battle of crypto exchanges founded by convicts<p>Source: ars TECHNICA</p><br><p>The bankruptcy estate of collapsed cryptocurrency exchange FTX has sued the company's former rival Binance. The lawsuit seeks "at least $1.76 billion that was fraudulently transferred to Binance and its executives at the FTX creditors' expense, as well as compensatory and punitive damages to be determined at trial." The complaint filed yesterday in U.S. Bankruptcy Court in Delaware names Binance and co-founder and former CEO Changpeng Zhao among the defendants. FTX founder Sam Bankman-Fried sold 20 percent of his crypto exchange to Binance in Nov. 2019, but Binance exited that investment in 2021, the lawsuit said. <a href="https://arstechnica.com/tech-policy/2024/11/ftx-sues-binance-for-1-76b-in-battle-of-crypto-exchanges-founded-by-convicts/">Full Story</a></p>
https://arstechnica.com/tech-policy/2024/11/ftx-sues-binance-for-1-76b-in-battle-of-crypto-exchanges-founded-by-convicts/
cybersecurityventures:67333954b788c00303c5d9ffTue, 12 Nov 2024 00:00:00 GMTDark web crypto laundering kingpin sentenced to 12.5 years in prison<p>Source: The Register</p><br><p>The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in U.S. prison. Roman Sterlingov, 36, a Russian-Swedish national, was also ordered to repay more than half a billion dollars accrued from the cryptocurrency mixing service that he ran for a decade between 2011 and 2021. Bitcoin Fog was assessed to have processed 1.2 million Bitcoin during that time, worth roughly $400 million at the time it was shuttered. Of this, Sterlingov was ordered to repay $395,563,025.39 in restitution, forfeit roughly $1.76 million in seized assets, and relinquish control of Bitcoin Fog's wallet containing more than $100 million in Bitcoin. <a href="https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/">Full Story</a></p>
https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/
cybersecurityventures:67333b4b7dcab60324ca09f7Tue, 12 Nov 2024 00:00:00 GMTApple phones might be harder for police to unlock, thanks to new reboot feature<p>Source: TechCrunch</p><br><p>New code introduced in the latest version of Apple’s mobile operating system could make it more difficult for both police and thieves to unlock iPhones. <a href="https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out/">404 Media reports</a> that law enforcement officials were warning each other that phones being stored for forensic examination seemed to be rebooting themselves — something that security experts confirmed in a <a href="https://www.404media.co/apple-quietly-introduced-iphone-reboot-code-which-is-locking-out-cops/">follow-up story</a>. After the reboot, it’s harder for those phones to be unlocked by password-cracking tools. Matthew Green, a cryptographer and assistant professor at Johns Hopkins University, described this as “a huge improvement in terms of security” that “probably doesn’t inconvenience anyone” — though the police might disagree. <a href="https://techcrunch.com/2024/11/09/iphones-might-be-harder-for-police-to-unlock-thanks-to-new-reboot-feature/">Full Story</a></p>
https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out/
cybersecurityventures:6731e9247dcab60324b58cfbMon, 11 Nov 2024 00:00:00 GMTNorth Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS<p>Source: The Hacker News</p><br><p>A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne dubbed the campaign <a href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">Hidden Risk</a>. The activity "uses emails propagating fake news about cryptocurrency trends to infect targets via a malicious application disguised as a PDF file," researchers said in a report shared with The Hacker News. As revealed by the FBI in a September <a href="https://www.ic3.gov/PSA/2024/PSA240903">advisory</a>, these campaigns are part of "highly tailored, difficult-to-detect social engineering" attacks aimed at employees working in the decentralized finance (DeFi) and cryptocurrency sectors. <a href="https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html">Full Story</a></p>
https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/
cybersecurityventures:672df83b0d771402e4a39d5bFri, 08 Nov 2024 00:00:00 GMTM2 crypto exchange hacked for $13M, user funds already restored<p>Source: Cointelegraph</p><br><p>Centralized cryptocurrency exchange (CEX) M2 was hacked for $13.7 million worth of digital assets, the exchange shared in an Oct. 31 announcement, which stated: “We would like to report that the situation has been fully resolved and customer funds have been restored. M2 has taken full responsibility for any potential losses, demonstrating our unwavering commitment to safeguarding our customers’ interests. All services are now fully operational with additional controls in place.” Hackers managed to steal the $13.7 million in Bitcoin from the exchange’s hot wallets, wrote pseudonymous onchain investigator ZachXBT in a Nov. 1 Telegram post. <a href="https://cointelegraph.com/news/m2-crypto-exchange-hacked-13-m-funds-restored">Full Story</a></p>
https://cointelegraph.com/news/m2-crypto-exchange-hacked-13-m-funds-restored
cybersecurityventures:6728baa04829960303351f37Mon, 04 Nov 2024 00:00:00 GMTTruth Terminal founder’s X account hacked, $600K stolen<p>Source: Cointelegraph</p><br><p>The developer behind the AI-powered X account Truth Terminal, an AI chatbot that merges artificial intelligence with memecoin culture and cryptocurrency dynamics, appears to have been hacked to shill a spurious memecoin, with the attackers clearing over $600,000 from the endeavor. On Oct. 29, Ayrey’s X account made a cryptic post announcing the launch of the new Infinite Backrooms (IB) token, with a picture that included the contract address for the memecoin — which sent the token rallying quickly to a $25 million valuation. However, the wallet responsible for deploying the token purchased 124.6 million IB for $38,400 at launch and sold the entirety of its holdings within 45 minutes for a total profit of $602,500, according to <a href="https://dexscreener.com/solana/gcdd3jlws37mevuvws8vawbgn2rzeefrrok23jy7g5x6">data</a> from Descreener. <a href="https://cointelegraph.com/news/truth-terminal-founder-x-account-hacked-promotes-scam-memecoin">Full Story</a>
</p>
https://dexscreener.com/solana/gcdd3jlws37mevuvws8vawbgn2rzeefrrok23jy7g5x6
cybersecurityventures:6720c1bdda415d02f7f2ed84Tue, 29 Oct 2024 00:00:00 GMTUS government-linked address likely exploited for over $20 million in crypto<p>Source: CryptoSlate</p><br><p>A hacker may have stolen over $20 million worth of crypto, including stablecoins and Ethereum (ETH), from a U.S. government-controlled wallet connected to the infamous 2016 Bitfinex hack. The suspicious transfers occurred Oct. 24, raising alarms among blockchain analysts. Arkham Intelligence first flagged the transfers from the wallet, which had been dormant for eight months before it suddenly moved $1.25 million in Tether (USDT) and $5.5 million in USD Coin (USDC) from the DeFi platform Aave. Additionally, around $13.7 million in aUSDC — an interest-bearing token representing USDC deposited in Aave — along with $446,000 worth of Ethereum, was sent to a recently created wallet. Update: The stolen funds were <a href="https://cryptoslate.com/hacker-returns-stolen-funds-to-us-government-in-less-than-24-hours/">returned</a> within 24 hours. <a href="https://cryptoslate.com/us-government-linked-address-likely-exploited-for-over-20-million-in-crypto/">Full Story</a>
</p>
https://cryptoslate.com/hacker-returns-stolen-funds-to-us-government-in-less-than-24-hours/
cybersecurityventures:671b804ac7add6028b4fdd00Fri, 25 Oct 2024 00:00:00 GMT93K People Impacted By Transak Data Breach<p>Source: CoinDesk</p><br><p>A crypto industry employee's use of a laptop for non-work purposes is reportedly at the heart of a data breach involving some 93,000 unique users – and now a ransomware group is attempting to negotiate with the company that was targeted. Transak, an "onramp" used by a number of popular blockchain companies to allow customers to buy cryptocurrencies, disclosed in a <a href="https://transak.com/blog/transak-security-incident-oct-2024">blog post</a> on Oct. 21 that it had fallen victim to a data breach. According to Transak, the leaked data was limited to "names" and "basic identity information." In an interview with CoinDesk, Transak CEO Sami Start said that 93,000 people were impacted by the breach, which included passports, ID cards and selfies used by customers to verify their identities with crypto financial products. <a href="https://www.coindesk.com/tech/2024/10/21/crypto-on-ramp-service-transak-targeted-in-data-breach/">Full Story</a></p>
https://transak.com/blog/transak-security-incident-oct-2024
cybersecurityventures:67178b91c8cf6d030138f4c1Tue, 22 Oct 2024 00:00:00 GMTRadiant Capital Loses $50M to Second Blockchain Exploit This Year<p>Source: CoinDesk</p><br><p>Blockchain lending protocol Radiant Capital lost more than $50 million on Oct. 16 as the result of an apparent cyberattack, according to security experts and blockchain data. An attacker gained control of Radiant Capital's blockchain contracts by obtaining three of the "private keys" that control the protocol, security experts said. The Radiant platform encompasses a suite of tools allowing users to borrow, lend, and bridge cryptocurrencies across blockchains. It's the second time this year that the protocol has been targeted in an exploit: In January, Radiant lost $4.5 million in an unrelated hack stemming from a bug in its smart contracts. <a href="https://www.coindesk.com/tech/2024/10/16/radiant-capital-loses-50m-to-blockchain-exploit/">Full Story</a></p>
https://www.coindesk.com/tech/2024/10/16/radiant-capital-loses-50m-to-blockchain-exploit/
cybersecurityventures:671241b76c90960306b088f2Fri, 18 Oct 2024 00:00:00 GMTHow the FBI used a fake AI fund coin to nab fraudsters<p>Source: Cointelegraph</p><br><p>The FBI used a fake artificial intelligence fund crypto to catch alleged fraudsters engaged in market manipulation. According to an Oct. 7 indictment in Massachusetts Federal District Court, the coin, which the agency called “NexFundAI (NEXF),” was presented as a crypto security that claimed to represent shares in an AI-related fund. The FBI <a href="https://www.justice.gov/d9/2024-10/zhou_information_0.pdf">told</a> scammers that it wanted help manipulating the token’s trading volume. This would fool investors into believing that the coin was more popular than it actually was. The scammers offered to help with the fraud, and the agency used the evidence collected during this process to get an indictment against them. <a href="https://cointelegraph.com/news/fbi-token-fake-ai-fund-coin-fraud">Full Story</a></p>
https://www.justice.gov/d9/2024-10/zhou_information_0.pdf
cybersecurityventures:670cff87ddfa8c02d2768d0bMon, 14 Oct 2024 00:00:00 GMTUkrainian National Pleads Guilty to “Raccoon Infostealer” Cybercrime<p>Source: U.S. Department of Justice</p><br><p>A Ukrainian national pleaded guilty in federal court Oct. 7 to one count of conspiracy to commit computer intrusion. Mark Sokolovsky, 28, conspired to operate the Raccoon Infostealer as a malware-as-a-service or “MaaS.” Individuals who deployed Raccoon Infostealer to steal data from victims leased access to the malware for approximately $200 per month, paid for by cryptocurrency. These individuals used various ruses, such as email phishing, to install the malware onto the computers of unsuspecting victims. Raccoon Infostealer then stole personal data from victim computers, including log-in credentials, financial information, and other personal records. As part of the plea, Sokolovsky agreed to restitution of nearly $1 million USD. <a href="https://www.justice.gov/usao-wdtx/pr/ukrainian-national-pleads-guilty-raccoon-infostealer-cybercrime">News Release</a></p>
https://www.justice.gov/usao-wdtx/pr/ukrainian-national-pleads-guilty-raccoon-infostealer-cybercrime
cybersecurityventures:670661d0179f84031987b290Wed, 09 Oct 2024 00:00:00 GMTU.S. agency warns against Trinity ransomware targeting health sector<p>Source: Cointelegraph</p><br><p>A U.S. government agency warned about Trinity ransomware, known for extorting crypto from its victims in exchange for not leaking data accessed via several attack vectors. On Oct. 4, the US Health Sector Cybersecurity Coordination Center (HC3) <a href="https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf">published</a> a profile of Trinity ransomware, a threat actor that targets sensitive data. The attackers use phishing emails, malicious websites and software vulnerabilities to trick victims into installing the ransomware on their computers. It then searches the computer for sensitive information, collects it, and sends it to hackers. The ransomware also encrypts the victim’s files with an algorithm, rendering them useless. <a href="https://cointelegraph.com/news/us-agency-warns-trinity-ransomware-targeting-institutions">Full Story</a></p>
https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf
cybersecurityventures:67066347ea040d029397281bWed, 09 Oct 2024 00:00:00 GMTSoutheast Asia cyber scammers stole $37B in 2023 as AI-driven crimes soar: UN report<p>Source: New York Post</p><br><p>Southeast Asia has become a hotbed for cyber crime syndicates who have swiped as much as $37 billion last year through romance-investment schemes, crypto fraud, money laundering and illegal gambling, according to a new United Nations <a href="https://www.unodc.org/roseap/uploads/documents/Publications/2024/TOC_Convergence_Report_2024.pdf">report</a>. Cyber criminals in countries like Myanmar, Cambodia and Laos are using malware, generative artificial intelligence and deepfakes at greater rates to carry out the scams, the report by the UN’s Office on Drugs and Crime found. “The <a href="https://fortune.com/asia/2024/10/07/southeast-asia-scammers-stole-up-to-37-billion-un/">transnational organized crime threat landscape in Southeast Asia</a> is evolving faster than in any previous point in history,” according to the report, first cited by Fortune. <a href="https://nypost.com/2024/10/07/business/southeast-asia-scammers-stole-up-to-37b-last-year-report/">Full Story</a></p>
https://www.unodc.org/roseap/uploads/documents/Publications/2024/TOC_Convergence_Report_2024.pdf
cybersecurityventures:6704fe25880ad902e676a86fTue, 08 Oct 2024 00:00:00 GMTLego's website was hacked to promote a crypto scam<p>Source: Engadget</p><br><p>People who visited Lego's website on the evening of Oct. 4 were welcomed by a banner with illustrated golden coins bearing the company's logo, claiming that the "Lego coin" is now officially out. It even promised "secret rewards" to those who'd buy some. But Lego wasn't truly launching an official cryptocurrency coin, and <a href="https://www.thebrickfan.com/lego-shop-hacked-by-crypto-scam/">according to The Brick Fan</a>, the button to buy led to an external cryptocurrency website selling "LEGO Tokens" with Ethereum. The website was, seemingly, hijacked by bad actors who switched its banner and used it for some sort of crypto scam. Billund, Denmark-based Lego is one of the world’s largest manufacturers of toys. <a href="https://www.engadget.com/cybersecurity/legos-website-was-hacked-to-promote-a-crypto-scam-140045757.html">Full Story</a>
</p>
https://www.thebrickfan.com/lego-shop-hacked-by-crypto-scam/
cybersecurityventures:6703b8a7c3639b02f239f404Mon, 07 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/hack-blotter - Success ✔️
```rss
Hack Blotter
https://cybersecurityventures.com//hack-blotter
Hack Blotter - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:39 GMT5U.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTRussian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTHacker who stole and laundered billions in bitcoin with wife’s help gets 5-year sentence<p>Source: Reuters</p><br><p>A New York technology entrepreneur was sentenced to five years in prison on Thursday after pleading guilty last year to laundering funds stolen from Bitfinex, one of the world’s largest cryptocurrency exchanges, with the help of his wife. Ilya Lichtenstein, 35, hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques, and stole about 120,000 bitcoin, the Justice Department said in a statement. He and his wife Heather Morgan, who used the hip-hop alias “Razzklekhan” to promote her music, were arrested in Feb. 2022. <a href="https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/">Full Story</a></p>
https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/
cybersecurityventures:6737200286c94702d3fd0b32Fri, 15 Nov 2024 00:00:00 GMTTwo hackers allegedly filed more than 1,000 fraudulent U.S. tax returns<p>Source: Internal Revenue Service</p><br><p>The U.S. government unsealed charges Nov. 13 against two individuals for their scheme to allegedly intrude Massachusetts tax preparation firms’ computer networks to steal confidential client information and then file fraudulent tax returns seeking tax refunds to be deposited in bank accounts they controlled. From 2016 to 2021, Matthew A. Akande of Mexico and Nigeria and Kehinde H. Oyetunji of North Dakota and Nigeria, allegedly worked together to steal money from the U.S. government using taxpayers’ personally identifiable information to file more than 1,000 fraudulent tax returns seeking over $8.1 million in fraudulent tax refunds, and to have successfully obtained over $1.3 million in fraudulent tax refunds. <a href="https://www.irs.gov/compliance/criminal-investigation/computer-intrusion-and-theft-charges-unsealed-against-two-men">News Release</a></p>
https://www.irs.gov/compliance/criminal-investigation/computer-intrusion-and-theft-charges-unsealed-against-two-men
cybersecurityventures:67372a5af73d45030958631aFri, 15 Nov 2024 00:00:00 GMTSouth Korea police arrest 215 in suspected $228M crypto scam<p>Source: Reuters</p><br><p>South Korean police have arrested 215 people on suspicion of stealing 320 billion won ($228.4 million) in the biggest cryptocurrency investment scam in the country. Gyeonggi Nambu Provincial Police said on Nov. 13 the arrests included the alleged mastermind of the organized crime group accused of selling 28 types of virtual tokens to about 15,000 people by promising high returns. Police said the group had issued six of the 28 tokens on overseas crypto exchanges and were managing a team of market makers to push up prices. Police described the tokens as "worthless". Of the 215 people arrested, <a href="https://cointelegraph.com/news/south-korea-influencer-crypto-scam-215-arrests">12 remain in custody</a>, South Korean news agency Yonhap reported. <a href="https://www.reuters.com/technology/south-korea-police-arrest-215-suspected-228-mln-crypto-scam-2024-11-13/">Full Story</a></p>
https://cointelegraph.com/news/south-korea-influencer-crypto-scam-215-arrests
cybersecurityventures:6735d10ca5d99902c8cf35daThu, 14 Nov 2024 00:00:00 GMTHacker broke into metro Atlanta computer servers, extortion plot sentenced to 10 years in prison<p>Source: WSB-TV 2 Atlanta</p><br><p>An Idaho man who hacked into the servers belonging to the City of Newnan, Ga. has been sentenced to federal prison after stealing the personal information of 132,000 people, Department of Justice officials say. Robert Purbeck, 45 “purchased access to the computer server of a Griffin, Ga. medical clinic on a darknet marketplace in Feb. 2018.” Officials say he then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers. He then attempted to extort a Florida orthodontist for Bitcoin in return for his stolen patient files. <a href="https://www.yahoo.com/news/hacker-broke-metro-atlanta-computer-224226666.html">Full Story</a>
</p>
https://www.yahoo.com/news/hacker-broke-metro-atlanta-computer-224226666.html
cybersecurityventures:6735d409c7c0fc02b1899ab6Thu, 14 Nov 2024 00:00:00 GMTChinese national faces 20 years in US prison for laundering pig-butchering proceeds<p>Source: The Record</p><br><p>One of the ringleaders of a <a href="https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams">scheme to launder millions stolen through cryptocurrency investment scams</a> pleaded guilty in a California courtroom Nov. 12. Daren Li, 41, faces up to 20 years in prison for taking part in an operation that laundered more than $73 million stolen from people duped by so-called “pig-butchering” scams. Pig butchering typically involves a scammer forming a relationship with a victim on messaging platforms before persuading them to make fraudulent investments. Li is a dual citizen of China and St. Kitts and Nevis, as well as a resident of both Cambodia and the United Arab Emirates. He pleaded guilty to one count of conspiracy to commit money laundering. <a href="https://therecord.media/chinese-national-faces-20-years-money-laundering-pig-butchering">Full Story</a></p>
https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams
cybersecurityventures:6735db37be012e029d73a1e6Thu, 14 Nov 2024 00:00:00 GMTChinese official ruined by crypto investments gets life in prison for selling state secrets<p>Source: The Record</p><br><p>Chinese authorities announced Nov. 8 that a public servant who found himself with large debts due to failed cryptocurrency investments had been sentenced to life in prison for selling state secrets to an unidentified foreign intelligence agency. According to a <a href="https://baijiahao.baidu.com/s?id=1815140973005200476">post on Baidu</a> by the Ministry of State Security (MSS) — the Chinese Communist Party’s secret police and intelligence agency — the official, pseudonymised as Wang Moumou, was recruited after posting online about his financial difficulties. According to the MSS, Wang provided “top-secret and confidential national information to foreign parties,” for which he received “over 1 million yuan ($138,000) in espionage funds through methods such as virtual currency recharge and trading.” <a href="https://therecord.media/chinese-official-ruined-by-crypto-investments-sold-state-secrets">Full Story</a></p>
https://baijiahao.baidu.com/s?id=1815140973005200476
cybersecurityventures:67348d60ab35b002d0d25358Wed, 13 Nov 2024 00:00:00 GMTDiscord leaker Jack Teixeira gets 15-year sentence for sharing classified documents<p>Source: Engadget</p><br><p>Massachusetts Air National Guard member Jack Teixeira received a 15-year sentence in federal prison for leaking classified military documents on Discord in a Boston federal court, <a href="https://www.washingtonpost.com/national-security/2024/11/12/jack-teixeira-sentence-discord-leak/?location=alert">according to The Washington Post</a>. Teixeira shared classified military documents as far back as late 2022 on a Discord server dedicated to the pixelated sandbox game Minecraft. The leak included information about the Ukrainian and Russian troop movements and military equipment used in the war in Ukraine and Russia's attempts to obtain more weapons from Egypt and Turkey. The documents eventually found their way to other Discord servers as well as 4chan and Telegram. <a href="https://www.engadget.com/cybersecurity/discord-leaker-jack-teixeira-gets-15-year-sentence-for-sharing-classified-documents-231319586.html">Full Story</a></p>
https://www.washingtonpost.com/national-security/2024/11/12/jack-teixeira-sentence-discord-leak/?location=alert
cybersecurityventures:6734907bae45b202f77709feWed, 13 Nov 2024 00:00:00 GMTFounder of Cryptocurrency Financial Services Firm "Gotbit" Indicted for Market Manipulation and Fraud Conspiracy<p>Source: U.S. Department of Justice</p><br><p>A Russian national residing in Portugal has been indicted for his role in a wide-ranging conspiracy to manipulate cryptocurrency markets on behalf of client cryptocurrency companies. Aleksei Andriunin, 26, was charged with wire fraud and conspiracy to commit market manipulation and wire fraud in a superseding indictment. According to court documents, Andriunin was Gotbit’s Founder and CEO. Gotbit was a well-known “market maker” in the cryptocurrency industry. It is alleged that between 2018 and 2024, Gotbit provided market manipulation services to create artificial trading volume for multiple cryptocurrency companies, including companies located in the U.S. <a href="https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and">News Release</a></p>
https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and
cybersecurityventures:67349837608f8f02e9318900Wed, 13 Nov 2024 00:00:00 GMTDark web crypto laundering kingpin sentenced to 12.5 years in prison<p>Source: The Register</p><br><p>The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in U.S. prison. Roman Sterlingov, 36, a Russian-Swedish national, was also ordered to repay more than half a billion dollars accrued from the cryptocurrency mixing service that he ran for a decade between 2011 and 2021. Bitcoin Fog was assessed to have processed 1.2 million Bitcoin during that time, worth roughly $400 million at the time it was shuttered. Of this, Sterlingov was ordered to repay $395,563,025.39 in restitution, forfeit roughly $1.76 million in seized assets, and relinquish control of Bitcoin Fog's wallet containing more than $100 million in Bitcoin. <a href="https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/">Full Story</a></p>
https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/
cybersecurityventures:67333b4b7dcab60324ca09f7Tue, 12 Nov 2024 00:00:00 GMTSouth Dakota ATM Hackers Stole $100K, Arrested<p>Source: 99.1 KXLG</p><br><p>A 25-year-old man, Henry Theis, was arrested Nov. 9 by West Fargo, S.D. police while parked outside a Gate City Bank branch. Theis, believed to be part of a group of people from Venezuela, was involved in a series of thefts targeting ATMs. Police stopped Theis for driving without his headlights on and found a latex glove, a facemask, a computer keyboard, cables, and a bag containing nearly $25,000 in cash during a search of his car. Court documents reveal that Theis admitted to being part of an organization of hackers who were "jackpotting" ATMs, using a virus to steal money. Two other suspects were arrested in a traffic stop on I-29 near Watertown, bringing the total theft amount to almost $100,000. <a href="https://www.mykxlg.com/news/local/west-fargo-police-arrest-suspected-atm-hacker-linked-to-venezuelan-group-two-found-in-watertown/article_2564b01a-9d77-11ef-acda-c74bdbfbff0d.html">Full Story</a></p>
https://www.mykxlg.com/news/local/west-fargo-police-arrest-suspected-atm-hacker-linked-to-venezuelan-group-two-found-in-watertown/article_2564b01a-9d77-11ef-acda-c74bdbfbff0d.html
cybersecurityventures:6731df34066dce029762cf2bMon, 11 Nov 2024 00:00:00 GMTNigerian national gets 10-year sentence for stealing $20 million through business email compromise scams<p>Source: The Record</p><br><p>A Nigerian national was sentenced to 10 years in U.S. federal prison for stealing almost $20 million from hundreds of people through cyber fraud. Babatunde Francis Ayeni, a 33-year-old who had been living in the U.K, was convicted for his role in a business email compromise scheme that targeted real estate transactions. Ayeni pleaded guilty to wire fraud charges in April and was sentenced this week. Ayeni worked with two other people in Nigeria and the United Arab Emirates — co-defendants Feyisayo Ogunsanwo and Yusuf Lasisi — who allegedly sent phishing emails with malicious links and attachments to title companies, real estate agents, and real estate attorneys across the U.S. <a href="https://therecord.media/nigeria-national-twenty-million-scams">Full Story</a></p>
https://therecord.media/nigeria-national-twenty-million-scams
cybersecurityventures:6731e2ca8ff87203013d98deMon, 11 Nov 2024 00:00:00 GMTDiscord terrorist known as “Rabid” gets 30 years for preying on kids<p>Source: ars TECHNICA</p><br><p>A Michigan man who ran chat rooms and Discord servers targeting children playing online games and coercing them into self-harm, sexually explicit acts, suicide, and other violence was sentenced to 30 years in prison Nov. 7. <a href="https://www.justice.gov/opa/pr/member-violent-764-terror-network-sentenced-30-years-prison-sexually-exploiting-child">According to the U.S. Department of Justice</a>, Richard Densmore was a member of an online terrorist network called 764, which the FBI considers a "tier one" terrorist threat. He pled guilty to sexual exploitation of a child as "part of a broader indictment that charged him with other child exploitation offenses." In the DOJ's press release, FBI Director Christopher Wray committed to bring to justice any abusive groups known to be preying on vulnerable kids online. <a href="https://arstechnica.com/tech-policy/2024/11/discord-terrorist-known-as-rabid-gets-30-years-for-preying-on-kids/">Full Story</a></p>
https://www.justice.gov/opa/pr/member-violent-764-terror-network-sentenced-30-years-prison-sexually-exploiting-child
cybersecurityventures:6731e4866fc1ff02f3457b3eMon, 11 Nov 2024 00:00:00 GMTMinnesota Man Sentenced to Five Years in Prison for $2.3M Romance Fraud Scheme<p>Source: U.S. Attorney's Office, District of Minnesota</p><br><p>A Brooklyn Park, Minn. man has been sentenced to 63 months in prison, three years of supervised release, and was ordered to pay full restitution in the amount of $2,144,291.86 for facilitating a national romance fraud scheme. According to court documents, beginning in May 2018 through Jun. 2022, Dodzi Kwame Kordorwu, 38, helped facilitate an online romance fraud scheme that targeted primarily elderly victims and lured them into sending money under false pretenses. The scheme relied on perpetrators impersonating a real or plausible but fictitious person, such as a senior U.S. diplomat or military official, that contacted the victims through online social media applications. <a href="https://cybersecurityventures.com//Brooklyn%20Park%20Man%20Sentenced%20to%20Five%20Years%20in%20Prison%20for%20$2.3M%20Romance%20Fraud%20Scheme">News Release</a></p>
https://cybersecurityventures.com//Brooklyn%20Park%20Man%20Sentenced%20to%20Five%20Years%20in%20Prison%20for%20$2.3M%20Romance%20Fraud%20Scheme
cybersecurityventures:672caacb36fb0503186cc4c3Thu, 07 Nov 2024 00:00:00 GMTNigeria Arrests 113 Foreigners in Cybercrime Sweep<p>Source: Organized Crime and Corruption Reporting Project (OCCRP)</p><br><p>Nigerian authorities have arrested 113 foreign nationals in connection with high-level hacking activities deemed a threat to national security, officials said Nov. 3. The arrests followed a coordinated raid on a building in the Jahi area of Abuja, according to Olumuyiwa Adejobi, Public Relations Officer of the Nigeria Police Force. Adejobi said the suspects were detained after an extensive operation targeting cybercrime networks. Authorities reported that the suspects used computers and advanced technology to carry out a range of cybercrimes, including hacking, identity theft, fraudulent email schemes, and other digital frauds. <a href="https://www.occrp.org/en/news/nigeria-arrests-113-foreigners-in-cybercrime-sweep">Full Story</a></p>
https://www.occrp.org/en/news/nigeria-arrests-113-foreigners-in-cybercrime-sweep
cybersecurityventures:672b508fa17ab302ac9aa211Wed, 06 Nov 2024 00:00:00 GMTINTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime<p>Source: The Hacker News</p><br><p>INTERPOL on Nov. 5 said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from Apr. 1 to Aug. 31, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 percent were taken down and 59 servers were seized," INTERPOL said. "Additionally, 43 electronic devices, including laptops, mobile phones and hard disks were seized." The actions also led to the arrest of 41 individuals, with 65 others still under investigation. <a href="https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html">Full Story</a></p>
https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html
cybersecurityventures:672b592ca17ab302ac9b5927Wed, 06 Nov 2024 00:00:00 GMTCanada Arrests Man Suspected of Hacks of Snowflake Customers<p>Source: Bloomberg</p><br><p>Canadian authorities have arrested a man suspected of being behind a string of hacks involving as many as 165 customers of Snowflake Inc., according to people familiar with the matter. Some of the known victims that had their data stolen included AT&T, Live Nation (Ticketmaster’s parent company), and Advanced Auto Parts. Following a request from the U.S., Alexander “Connor” Moucka was taken into custody on a provisional arrest warrant on Oct. 30, according to Canada’s Department of Justice. He is due to appear in court Nov. 5. <a href="https://www.bloomberg.com/news/articles/2024-11-05/hacker-said-to-be-behind-breach-of-snowflake-customers-arrested?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-05/hacker-said-to-be-behind-breach-of-snowflake-customers-arrested?embedded-checkout=true
cybersecurityventures:672a094966237f02a33755edTue, 05 Nov 2024 00:00:00 GMTFired Disney staffer accused of hacking menu, removing allergen info<p>Source: The Register</p><br><p>An ex-Disney employee has been arrested and charged with hacking his former employer's systems. Michael Scheuer was charged [PDF] and arrested last week for allegedly breaking into his former employer's systems. Fired from his role as a menu production manager in June, a month later Scheuer accessed the menu creation system Disney contracted another company to create and he changed all the fonts in the system to wingdings symbols. According to the complaint, the changes knocked the system offline for a couple of weeks, requiring backup restoration to fix. Scheuer is also accused of having downloaded menus and altered them to eliminate allergen information, suggesting foods were safe when they weren't. <a href="https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/">Full Story</a></p>
https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/
cybersecurityventures:67235fe3dd7f9102cc9840f0Thu, 31 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/cybersecurity-venture-capital-vc-deals - Success ✔️
```rss
VC Deal Flow
https://cybersecurityventures.com//cybersecurity-venture-capital-vc-deals
VC Deal Flow - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:40 GMT5Twine Raises $12M in Seed funding to deploy AI cyber workers<p>Source: CTech</p><br><p>Cybersecurity startup Twine, founded by former executives from Claroty, has raised $12 million in a Seed funding round co-led by Ten Eleven Ventures and Dell Technologies Capital. Notably, two of the co-founders of Wiz, Assaf Rappaport and Roy Reznik, also participated in the funding round, alongside other investors. The company operates from offices in Tel Aviv and Seattle, employing over 20 people across Israel and the U.S. Twine’s platform equips cybersecurity teams with digital employees who work alongside cyber teams to complete their security objectives. <a href="https://www.calcalistech.com/ctechnews/article/hy9k4eofkg">Full Story</a></p>
https://www.calcalistech.com/ctechnews/article/hy9k4eofkg
cybersecurityventures:673dd196091a3502bfbd7fd2Wed, 20 Nov 2024 00:00:00 GMTPrompt Security raises $18 million to help companies better secure generative AI tools<p>Source: Business Insider</p><br><p>Prompt Security is helping companies manage the cybersecurity risks associated with generative AI tools like OpenAI's ChatGPT or Google's Gemini. Founded in 2023, Prompt has raised $18 million in fresh funding, Business Insider has learned exclusively. The round was led by Jump Capital, with participation from Hetz Ventures, Ridge Ventures, and tech companies Okta and F5. The startup previously raised $6 million in seed funding. Prompt Security counts a number of Fortune 500 companies among its customer base. The company is finishing the year with $1 million in annual revenue. <a href="https://www.businessinsider.com/prompt-security-raise-18-million-secure-generative-ai-tools-2024-11">Full Story</a></p>
https://www.businessinsider.com/prompt-security-raise-18-million-secure-generative-ai-tools-2024-11
cybersecurityventures:673e204591a3f102c94e9d20Wed, 20 Nov 2024 00:00:00 GMTHopae Secures $6.5 Million for Digital Identification and Verification<p>Source: PRWeb</p><br><p>Hopae, makers of the world's most advanced digital identity solution, announced $6.5 million in funding as the company introduces its proprietary, patented Digital Credential eXpress (DCX) architecture to the U.S., simplifying the complex world of decentralized ID (DID) implementation. Hopae helps governments and institutions issue reusable, privacy-preserving, and unforgeable digital IDs and credentials. Its expansion and funding news comes as companies seek to comply with new international digital identity regulations. Hopae has offices in Seoul, Paris and is currently establishing its new headquarters in San Francisco. <a href="https://www.prweb.com/releases/hopae-secures-6-5-million-for-digital-identification-and-verification-making-processes-safer-and-easier-all-over-the-world-302311570.html">Press Release</a></p>
https://www.prweb.com/releases/hopae-secures-6-5-million-for-digital-identification-and-verification-making-processes-safer-and-easier-all-over-the-world-302311570.html
cybersecurityventures:673e2757189579031a74b839Wed, 20 Nov 2024 00:00:00 GMTRIIG Secures $3 Million to Help Protect Organizations from Cyber Threats<p>Source: PRWeb</p><br><p>RIIG, a risk intelligence and cybersecurity solutions provider, announced that it has closed a $3 million seed funding round. This capital will be used to accelerate the development and launch of RIIG's AI-powered solutions, expand client support, and grow its sales and marketing teams. Specializing in white hat data trust services, RIIG offers open-source intelligence solutions designed for Zero Trust environments. With access to 17 intel agencies and collaborations with commercial partners, RIIG empowers organizations with high-quality, verifiable data and advanced intelligence solutions that enable robust security and effective risk management. <a href="https://www.prweb.com/releases/riig-secures-3-million-to-help-protect-organizations-from-cyber-threats-with-advanced-data-intelligence-solutions-302306881.html">Press Release</a></p>
https://www.prweb.com/releases/riig-secures-3-million-to-help-protect-organizations-from-cyber-threats-with-advanced-data-intelligence-solutions-302306881.html
cybersecurityventures:673cbdb7256a2202f139218dTue, 19 Nov 2024 00:00:00 GMTSurePath AI Announces $5.2M Seed Funding to Secure GenAI Adoption in the Enterprise<p>Source: PR Newswire</p><br><p>SurePath AI, a leader in governing generative AI for the enterprise, announced the closure of a $5.2 million seed funding round led by Uncork Capital with significant participation from Operator Collective, bringing the company's total funding to $6.3 million. SurePath AI's mission is to enable secure GenAI adoption by detecting usage, mitigating risks, and controlling AI access to enterprise data so that organizations can bolster innovation and productivity. "As GenAI adoption continues to surge across industries, businesses are challenged to balance the risks and benefits," said Casey Bleeker, CEO and Founder of SurePath AI. <a href="https://www.prnewswire.com/news-releases/surepath-ai-announces-over-5-million-in-seed-funding-to-secure-genai-adoption-in-the-enterprise-302304040.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/surepath-ai-announces-over-5-million-in-seed-funding-to-secure-genai-adoption-in-the-enterprise-302304040.html
cybersecurityventures:673b33a5152f2d029df7ceefMon, 18 Nov 2024 00:00:00 GMTCyber Upgrade secures €2.5M Seed to automate cyber oversight<p>Source: Tech.eu</p><br><p>Cyber Upgrade, a Lithuania-based cybersecurity provider, has raised €2.5 million in a Seed funding round backed by Superhero Capital, Specialist VC, FIRSTPICK, NGL Ventures, and angel investors Marios S. Kalochoritis and Sergei Anikin, ex-CEO of PipeDrive. This investment is the company's second in 12 months, following a Pre-Seed round of €650,000 in Feb. 2024. The funding will be used to enhance its AI system, aiming for it to operate autonomously with no human oversight. <a href="https://tech.eu/2024/11/14/cyber-upgrade-secures-2-5m-seed-to-automate-cyber-oversight/">Full Story</a></p>
https://tech.eu/2024/11/14/cyber-upgrade-secures-2-5m-seed-to-automate-cyber-oversight/
cybersecurityventures:6735e263ba956f02a1237876Thu, 14 Nov 2024 00:00:00 GMTIsraeli cybersecurity company Upwind raises $100M<p>Source: GLOBES</p><br><p>Israeli cybersecurity company Upwind Security has nearly completed a $100 million Series B financing round at a company valuation $850-900 million, post money, TechCrunch reports. New and existing investors in the latest round include Craft Ventures, Greylock, CyberStarts, Leaders Fund, Omri Casspi’s Sheva Fund, and basketball star Steph Curry’s investment fund Penny Jar. TechCrunch says that the financing round could be closed this week. The company has 100 employees in its Tel Aviv development center and 50 employees in its San Francisco headquarters as well as offices in the UK and Iceland. <a href="https://en.globes.co.il/en/article-israeli-cybersecurity-co-upwind-raises-100m-report-1001493613">Full Story</a></p>
https://en.globes.co.il/en/article-israeli-cybersecurity-co-upwind-raises-100m-report-1001493613
cybersecurityventures:673340d2a6e10d02a40c49f6Tue, 12 Nov 2024 00:00:00 GMTEmbed Security Raises $6M in Funding<p>Source: FINSMES</p><br><p>Embed Security, a Reno, Texas-based provider of an agentic security platform, raised $6M in funding. The round was led by Paladin Capital Group with participation from industry executive angel investors. The company intends to use the funds to accelerate R&D, expand customer engagements, and build out a team to continue solving critical cyber security challenges. Its technology is currently being tested with early-access customers in the automotive, insurance, legal, and technology sectors. Embed Security was founded in 2024. <a href="https://www.finsmes.com/2024/11/embed-security-raises-6m-in-funding.html">Full Story</a></p>
https://www.finsmes.com/2024/11/embed-security-raises-6m-in-funding.html
cybersecurityventures:672df9510d771402e4a3a7e0Fri, 08 Nov 2024 00:00:00 GMTUK's CloudGuard secures multi-million-pound backing<p>Source: BusinessCloud</p><br><p>A Manchester, U.K.-based cybersecurity startup has become the latest North West business to raise Northern Powerhouse Investment Fund II funding. Founded in 2020, CloudGuard specialises in automation and AI-led cyber attack detection, protection and response services to help businesses proactively remove threats in real time. It intends to create up to 20 new cybersecurity jobs over the next 12 months, taking its workforce to 50, and strengthen its AI research partnerships with Manchester universities. CloudGuard raised the money from NPIF II – Praetura Equity Finance, which is managed by Praetura Ventures as part of the Northern Powerhouse Investment Fund. <a href="https://businesscloud.co.uk/news/manchesters-cloudguard-secures-multi-million-pound-backing/">Full Story</a></p>
https://businesscloud.co.uk/news/manchesters-cloudguard-secures-multi-million-pound-backing/
cybersecurityventures:672ca17c2c760a03171e016dThu, 07 Nov 2024 00:00:00 GMTCorgea raises $2.5M in seed funding<p>Source: Zawya</p><br><p>Corgea, a pioneering cybersecurity startup specializing in AI-driven vulnerability detection and remediation, announced that it has raised $2.5 million in seed funding. The round was led by Shorooq Partners, with participation from prominent investors Y Combinator (YC), Propeller, Decacorn Capital, Unbound Ventures, and various prominent angels such as Jawed Karim (co-founder of Youtube & Y Ventures) and Sam Kassoumeh (Co-founder of SecurityScoreCard). This funding round marks a significant milestone for Corgea as it seeks to scale its platform and expand its operations within the US and across the Middle East and beyond. <a href="https://www.zawya.com/en/press-release/companies-news/shorooq-leads-corgeas-26mln-seed-round-to-revolutionize-cybersecurity-with-ai-driven-vulnerability-remediation-ttezp6x4">Press Release</a></p>
https://www.zawya.com/en/press-release/companies-news/shorooq-leads-corgeas-26mln-seed-round-to-revolutionize-cybersecurity-with-ai-driven-vulnerability-remediation-ttezp6x4
cybersecurityventures:672b4fe6aee15402df1aaad9Wed, 06 Nov 2024 00:00:00 GMTSymbiotic Security helps developers find bugs as they code<p>Source: TechCrunch</p><br><p>New York City-based Symbiotic Security, which is announcing a $3 million seed round, watches over developers as they code and points out potential security issues in real time. Other companies do this, but Symbiotic also emphasizes the next step: teaching developers to avoid these bugs in the first place. Ideally, this means developers will fix security bugs before they ever get into a code repository, which in turn should also speed up the overall development process. <a href="https://techcrunch.com/2024/11/05/symbiotic-security-helps-developers-find-bugs-as-they-code/">Full Story</a></p>
https://techcrunch.com/2024/11/05/symbiotic-security-helps-developers-find-bugs-as-they-code/
cybersecurityventures:672b5f2041a64302a7db3c47Wed, 06 Nov 2024 00:00:00 GMTBugcrowd Secures $50 Million Growth Capital Facility from Silicon Valley Bank<p>Source: Silicon Valley Bank</p><br><p>Silicon Valley Bank (SVB), a division of First Citizens Bank, today announced it has provided a $50 million growth capital facility to Bugcrowd, a leading provider of crowdsourced cybersecurity solutions. Bugcrowd brings the collective ingenuity of organizations and hackers to mitigate vulnerabilities across all applications, systems, and infrastructure. Provided by SVB’s Enterprise Software Group, the new financing will further scale Bugcrowd’s AI-powered platform globally, fund continued innovation into the Bugcrowd Platform, and leverage opportunities for strategic M&A, providing added value to clients, partners, and the hacker community. <a href="https://www.svb.com/news/client-news/bugcrowd-secures-$50-million-growth-capital-facility-from--silicon-valley-bank/">Press Release</a></p>
https://www.svb.com/news/client-news/bugcrowd-secures-$50-million-growth-capital-facility-from--silicon-valley-bank/
cybersecurityventures:6724b6521adf2102d007533aFri, 01 Nov 2024 00:00:00 GMTAI security platform Noma raises $25 million Series A<p>Source: CTech</p><br><p>Noma, a company developing a platform for AI security, has raised $25 million in a Series A round led by Ballistic Ventures. This comes less than a year after a $7 million Seed round led by Glilot Capital Partners, with participation from Cyber Club London. The rounds attracted dozens of strategic angel investors, including current and former CISOs of McDonald's, Google DeepMind, Twitter, Atlassian, BNP Paribas, T-Mobile, and Nielsen. Noma’s platform provides end-to-end AI discovery, security, protection, and compliance. <a href="https://www.calcalistech.com/ctechnews/article/b1ka3g11zkx">Full Story</a></p>
https://www.calcalistech.com/ctechnews/article/b1ka3g11zkx
cybersecurityventures:6724b6fcc6ba49030e98b057Fri, 01 Nov 2024 00:00:00 GMTNillion network raises $25M for decentralized privacy solutions<p>Source: Cointelegraph</p><br><p>The Nillion network has secured $25 million in a new funding round to support its decentralized privacy platform, which offers an optional blockchain component. This marks the network’s second fundraising round this year, following a previous round in February. Hack VC led the Oct. 30 round. Nillion claims to have built the world’s first Blind Computer. There are over 40 builders in the ecosystem, which is hosted on Cosmos. They include developers from Near, Aptos, Arbitrum, Mantle, IO.net and Ritual, among others AI agents, data marketplaces, private DeFi and healthcare analysts. <a href="https://cointelegraph.com/news/nillion-network-funding-decentralized-privacy-solutions">Full Story</a></p>
https://cointelegraph.com/news/nillion-network-funding-decentralized-privacy-solutions
cybersecurityventures:672372e2dd7f9102cc99839aThu, 31 Oct 2024 00:00:00 GMTCybersecurity firm FAT32 seals £550,000 investment to trigger growth<p>Source: Business Live</p><br><p>A UK-based cybersecurity business has become the first to secure investment from the Venture Sunderland Fund. FAT32 has secured a £550,000 finance deal, which includes £350,000 from the fund which was launched earlier this month by fund managers Northstar Ventures. The Sunderland business is making changes in the regulatory tech industry, helping to transform cyber-security compliance from a lengthy chore to an effortless process, with potential cost savings of up to 70 percent. The business says customers using its flagship OneClickComply tool can complete compliance tasks up to 20 times faster than traditional methods. <a href="https://www.msn.com/en-gb/money/other/sunderland-cyber-security-firm-seals-550000-investment-to-trigger-growth/ar-AA1tcMkl?ocid=BingNewsVerp">Full Story</a></p>
https://www.msn.com/en-gb/money/other/sunderland-cyber-security-firm-seals-550000-investment-to-trigger-growth/ar-AA1tcMkl?ocid=BingNewsVerp
cybersecurityventures:6723abea249f880318813590Thu, 31 Oct 2024 00:00:00 GMTZenity raises $38 million Series B to protect AI copilots from cyber threats<p>Source: CTech</p><br><p>Zenity, which specializes in AI-based cybersecurity, has raised $38 million in a Series B funding round led by Third Point Ventures and DTCP. This round follows a strategic investment by Microsoft’s venture fund, M12, with additional support from existing investors Intel Capital, UpWest, and Vertex Ventures, bringing Zenity’s total funding to $55 million. Zenity employs 52 people, including 32 in Israel. The new funding will accelerate development and enhance Zenity's platform. This investment will also support Zenity’s expansion in North America, particularly among financial organizations, pharmaceutical companies, and healthcare systems. <a href="https://cybersecurityventures.com//Zenity%20employs%2052%20people,%20including%2032%20in%20Israel.%20The%20new%20funding%20will%20accelerate%20development%20and%20enhance%20Zenity's%20platform,%20which%20secures%20the%20use%20of%20AI%20copilot%20systems%20and%20low-code%20applications%E2%80%94apps%20created%20with%20minimal%20coding.%20This%20investment%20will%20also%20support%20Zenity%E2%80%99s%20expansion%20in%20North%20America,%20particularly%20among%20financial%20organizations,%20pharmaceutical%20companies,%20and%20healthcare%20systems.">Full Story</a></p>
https://cybersecurityventures.com//Zenity%20employs%2052%20people,%20including%2032%20in%20Israel.%20The%20new%20funding%20will%20accelerate%20development%20and%20enhance%20Zenity's%20platform,%20which%20secures%20the%20use%20of%20AI%20copilot%20systems%20and%20low-code%20applications%E2%80%94apps%20created%20with%20minimal%20coding.%20This%20investment%20will%20also%20support%20Zenity%E2%80%99s%20expansion%20in%20North%20America,%20particularly%20among%20financial%20organizations,%20pharmaceutical%20companies,%20and%20healthcare%20systems.
cybersecurityventures:6722167adddc7003090d856fWed, 30 Oct 2024 00:00:00 GMTData Loss Prevention Startup MIND Emerges From Stealth With $11M in Funding<p>Source: Accesswire</p><br><p>MIND, the upcoming leader in data loss prevention (DLP), emerged from stealth with $11 million in seed round funding led by YL Ventures with participation from leaders of public cybersecurity companies. MIND was founded in 2023 by Eran Barak, who previously founded Hexadite which was later acquired by Microsoft, Itai Schwartz, Co-Founder and CTO, who was the first employee at Torq, a security automation startup, and at Axonius, an asset management unicorn startup, and Hod Bin Noon, Co-Founder and VP of R&D, who was the first employee at Dazz, specializing in real-time vulnerability detection and remediation. The co-founders have decades of cyber experience and served in leadership roles in the prestigious Israeli Military Intelligence Unit 8200. <a href="https://markets.businessinsider.com/news/stocks/data-loss-prevention-startup-mind-emerges-from-stealth-with-11m-in-funding-to-revolutionize-data-security-1033917570">Full Story</a></p>
https://markets.businessinsider.com/news/stocks/data-loss-prevention-startup-mind-emerges-from-stealth-with-11m-in-funding-to-revolutionize-data-security-1033917570
cybersecurityventures:6722b5fca9c3ea0293319fe4Wed, 30 Oct 2024 00:00:00 GMTArmis Raises $200M At $4.2B Valuation<p>Source: citybiz</p><br><p>Armis, a San Francisco-based cyber exposure management and security company, closed a $200 million Series D funding, increasing its total company valuation to a new high of $4.2 billion. The round was led by General Catalyst and Alkeon Capital, with participation from existing investors Brookfield Technology Partners and Georgian. The company intends to use the funds to accelerate organic product innovation and global go-to-market programs. This new round of funding comes after Armis recently announced it had surpassed the $200 million USD in Annual Recurring Revenue (ARR) mark, growing ARR by an additional $100 million in less than 18 months. The company is targeting a future IPO. <a href="https://www.citybiz.co/article/618933/armis-raises-200m-at-4-2b-valuation-2/">Full Story</a></p>
https://www.citybiz.co/article/618933/armis-raises-200m-at-4-2b-valuation-2/
cybersecurityventures:6720c82757bc2602c3f7e7f0Tue, 29 Oct 2024 00:00:00 GMTUK-based CybaVerse gets €1.3 million to simplify cyber security management for SMEs<p>Source: EU-Startups</p><br><p>CybaVerse, a rapidly advancing player in the cybersecurity space, has secured over €1.3 million in funding, fueling its bold vision for growth and innovation. Backed by FSE Group, Haatch, Founder & Lightning, and several angel investors, including FSE angels and the University of Sussex Business Angels group, this milestone highlights CybaVerse’s momentum as it redefines the future of cybersecurity with its SaaS platform, CybaVerse AI. The funding will drive team expansion and accelerate development of the platform, with the company recently appointing three senior leaders to spearhead this exciting next chapter. <a href="https://www.eu-startups.com/2024/10/uk-based-cybaverse-gets-e1-3-million-to-simplify-cyber-security-management-for-smes/">Full Story</a></p>
https://www.eu-startups.com/2024/10/uk-based-cybaverse-gets-e1-3-million-to-simplify-cyber-security-management-for-smes/
cybersecurityventures:671f6f16764f4702e43b1f79Mon, 28 Oct 2024 00:00:00 GMTConcentric AI secures $45m for AI-driven data security advancements<p>Source: FinTech Global</p><br><p>Concentric AI, a prominent provider of AI-based data security solutions, has successfully raised $45 million in a Series B financing round. This investment boosts the company’s total funding to more than $67 million. Insights into the company’s growth reveal a 300 percent increase in year-over-year growth and a tripling of its customer base in less than six months. The rising adoption of Generative AI solutions in enterprise settings, such as Microsoft Copilot, has further propelled the demand for sophisticated data security governance capable of securing enterprise GenAI tools and AI assistants. <a href="https://fintech.global/2024/10/28/concentric-ai-secures-45m-for-ai-driven-data-security-advancements/">Full Story</a></p>
https://fintech.global/2024/10/28/concentric-ai-secures-45m-for-ai-driven-data-security-advancements/
cybersecurityventures:671f72e86d5fe7031b09ce68Mon, 28 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/mergers-and-acquisitions-report - Success ✔️
```rss
M&A Tracker
https://cybersecurityventures.com//mergers-and-acquisitions-report
M&A Tracker - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:48:40 GMT5N-able to Acquire Cybersecurity Platform Adlumin<p>Source: MarketWatch</p><br><p>Software company N-able said Nov. 19 it has acquired cybersecurity platform and existing strategic partner Adlumin. The deal will include about $100 million cash and 1.58 million shares on the closing date. The acquisition also includes cash installments of $52.5 million and $67.5 million on the first and second anniversaries of closing the closing date. The deal will have up to $30 million of potential cash earn-outs payable in 2025 and 2026 based on certain performance metrics for 2024 and 2025. N-able said the acquisition will help scale its security portfolio and fast-growing annual recurring revenue from the existing partnership, and deliver deeper insights and remediation across internal IT teams. <a href="https://www.marketwatch.com/story/n-able-to-acquire-cybersecurity-platform-adlumin-7c935047?mod=dj-newswires">Full Story</a></p>
https://www.marketwatch.com/story/n-able-to-acquire-cybersecurity-platform-adlumin-7c935047?mod=dj-newswires
cybersecurityventures:673f25415159440315f4a2a6Thu, 21 Nov 2024 00:00:00 GMTEnzoic Announces Acquisition of VeriClouds<p>Source: Businesswire</p><br><p>Boulder, Colo.-based Enzoic announced the acquisition of VeriClouds, a pioneer in compromised password data collection. This acquisition will unite the strengths of both companies, enabling Enzoic to deliver even more innovative solutions under its established brand. Together, Enzoic and VeriClouds aim to redefine the compromised credential marketplace with deeper data insights and enhanced capabilities. The merger will enhance the threat intelligence services offered by both companies, integrating over 3,000 monitored sources from VeriClouds and additional data sources from Enzoic. <a href="https://www.businesswire.com/news/home/20241112512062/en/Enzoic-Announces-Acquisition-of-VeriClouds">Press Release</a></p>
https://www.businesswire.com/news/home/20241112512062/en/Enzoic-Announces-Acquisition-of-VeriClouds
cybersecurityventures:673f260d053a3402f1ddea38Tue, 19 Nov 2024 00:00:00 GMTBitSight buys dark web security specialist Cybersixgill for $115M<p>Source: TechCrunch</p><br><p>More consolidation is afoot in the world of cybersecurity. BitSight, a cybersecurity startup last valued at $2.4 billion when ratings firm Moody’s took a majority stake in the business in 2021, is acquiring Cybersixgill for $115 million. Boston, Mass.-based BitSight’s focus is cyber risk management. It works with enterprises to assess their risk profiles and specifically the likelihood that they will be breached, which covers not just evaluating a company’s attack surface across its network and other digital assets, but also the products that it uses to defend these. The smaller company, based out of Israel, originally launched as Sixgill. <a href="https://techcrunch.com/2024/11/14/bitsight-buys-dark-web-security-specialist-cybersixgill-for-115m/">Full Story</a></p>
https://techcrunch.com/2024/11/14/bitsight-buys-dark-web-security-specialist-cybersixgill-for-115m/
cybersecurityventures:67362e10d4a95a02c962f15aThu, 14 Nov 2024 00:00:00 GMTSnyk Expands API Security Testing With Acquisition Of Probely<p>Source: CRN</p><br><p>Snyk on Nov. 12 announced its acquisition of a vendor that focuses on providing security testing for APIs as well as web application security. The integration of technology developed by the firm, Probely, will enhance Snyk’s developer security software offering and enable greater support for AI-related development, Snyk Chief Innovation Officer Manoj Nair told CRN. Founded in 2016, Probely offers what Nair described as a “modern” approach to DAST (Dynamic Application Security Testing), something which Snyk’s platform has not offered previously. <a href="https://www.crn.com/news/security/2024/snyk-expands-api-security-testing-with-acquisition-of-probely">Full Story</a></p>
https://www.crn.com/news/security/2024/snyk-expands-api-security-testing-with-acquisition-of-probely
cybersecurityventures:67363563c7c0fc02b191bba8Thu, 14 Nov 2024 00:00:00 GMTTrustwave and Cybereason merge<p>Source: ITWire</p><br><p>Trustwave, a cybersecurity and managed security services leader, and Cybereason, a leading Endpoint Detection and Response (EDR) company, have announced a definitive merger agreement offering a comprehensive and expanded suite of cybersecurity solutions to stay ahead of the rapidly evolving threat landscape. With SoftBank as the majority investor, this strategic consolidation combines market-leading capabilities in Managed Detection and Response (MDR), EDR, offensive security, security research, Digital Forensics and Incident Response (DFIR), and elite threat intelligence services. <a href="https://itwire.com/guest-articles/company-news/trustwave-and-cybereason-merge-to-form-global-mdr-powerhouse-for-unparalleled-cybersecurity-value.html">Full Story</a></p>
https://itwire.com/guest-articles/company-news/trustwave-and-cybereason-merge-to-form-global-mdr-powerhouse-for-unparalleled-cybersecurity-value.html
cybersecurityventures:67349a73448a7b0312cf1cd5Wed, 13 Nov 2024 00:00:00 GMTMalwarebytes Acquires AzireVPN<p>Source: FINSMES</p><br><p>Malwarebytes, a Santa Clara, Calif.-based company which specializes in real-time cyber protection solutions, acquired AzireVPN, a privacy-focused VPN provider. The amount of the deal was not disclosed. By integrating AzireVPN’s advanced VPN technologies and intellectual property into its platform, Malwarebytes will deliver increased flexibility and enhanced security for customers. Malwarebytes delivers endpoint protection, privacy and threat prevention solutions worldwide. It is now used by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. <a href="https://www.finsmes.com/2024/11/malwarebytes-acquires-azirevpn.html">Full Story</a></p>
https://www.finsmes.com/2024/11/malwarebytes-acquires-azirevpn.html
cybersecurityventures:6731e7b18ff87203013e8e4cMon, 11 Nov 2024 00:00:00 GMTHealth Catalyst Signs Definitive Agreement to Acquire Top-Rated Cybersecurity Provider, Intraprise Health<p>Source: PR Newswire</p><br><p>Health Catalyst, Inc. (NASDAQ: HCAT), a leading provider of data and analytics technology and services to healthcare organizations, announced it has signed a definitive agreement to acquire Intraprise Health, LLC, a tech-enabled cybersecurity provider offering an end-to-end cybersecurity risk management platform and services to protect its clients from cyberattacks and manage follow-on liability in the event of an incident. Health Catalyst anticipates the acquisition will close in the fourth quarter of 2024. <a href="https://www.prnewswire.com/news-releases/health-catalyst-signs-definitive-agreement-to-acquire-top-rated-cybersecurity-provider-intraprise-health-302297976.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/health-catalyst-signs-definitive-agreement-to-acquire-top-rated-cybersecurity-provider-intraprise-health-302297976.html
cybersecurityventures:672cafaaeb53ba02e1e9da9bThu, 07 Nov 2024 00:00:00 GMTCrowdStrike to Acquire Adaptive Shield for around $300M<p>Source: Businesswire</p><br><p>CrowdStrike (NASDAQ: CRWD) announced it has agreed to acquire Adaptive Shield, a leader in SaaS Security. Calcalist has learned that CrowdStrike will pay <a href="https://www.calcalistech.com/ctechnews/article/s1zuniozkx">around $300 million</a> for the Israeli company. With this acquisition, CrowdStrike will be the only cybersecurity vendor to provide unified, end-to-end protection against identity-based attacks across the entire modern cloud ecosystem – from on-premises Active Directory to cloud-based identity providers and SaaS applications – delivered from a single, unified platform. Announced at Fal.Con Europe, CrowdStrike’s inaugural premier user conference in the region, this acquisition will position CrowdStrike as the leading provider of comprehensive protection across complex hybrid environments. <a href="https://ir.crowdstrike.com/news-releases/news-release-details/crowdstrike-acquire-adaptive-shield-deliver-only-platform">Press Release</a>
</p>
https://www.calcalistech.com/ctechnews/article/s1zuniozkx
cybersecurityventures:672b5da6da5c4602bbddac36Wed, 06 Nov 2024 00:00:00 GMTEverfox acquires Yakabod in Insider Risk deal<p>Source: Businesswire</p><br><p>Everfox, a recognized global provider of insider risk solutions and services across government, defense and critical infrastructure, announced today that it has acquired Yakabod Inc, a leading provider of case management software for security-driven organizations. This acquisition solidifies the multi-year partnership between Everfox and Yakabod as they jointly enhanced governance capabilities across insider risk, cyber incident management and other security-focused use cases. The insider risk mission has become one of the most critical challenges facing government and highly regulated customers. <a href="https://www.businesswire.com/news/home/20241101130572/en/CORRECTING-and-REPLACING-Everfox-Purchases-Yakabod-Inc-to-Enhance-Governance-for-the-Insider-Risk-Mission">Press Release</a></p>
https://www.businesswire.com/news/home/20241101130572/en/CORRECTING-and-REPLACING-Everfox-Purchases-Yakabod-Inc-to-Enhance-Governance-for-the-Insider-Risk-Mission
cybersecurityventures:672a13a8b6df3b0302a6e534Tue, 05 Nov 2024 00:00:00 GMTLondon-based UBDS buys 3B Data Security<p>Source: CRN</p><br><p>London-based technology services incubator UBDS Group has acquired 3B Data Security to enhance its cyber offering. The newly acquired cybersecurity MSP will remain autonomous and keep its brand identity intact, as well as its 23 employees, including the management team. Cambridge-based 3B Data Security provides Cybersecurity services, including digital forensic incident response, security training, information security consulting, and penetration testing. <a href="https://www.channelweb.co.uk/news/2024/ubds-3b-data-security">Full Story</a></p>
https://www.channelweb.co.uk/news/2024/ubds-3b-data-security
cybersecurityventures:672a14620362d602c0d9b2d9Tue, 05 Nov 2024 00:00:00 GMTLumifi Expands Service Offerings with Critical Insight Acquisition<p>Source: Channel Futures</p><br><p>Lumifi, a managed detection and response (MDR) provider, has acquired cybersecurity-as-a-service provider Critical Insight. This marks Lumifi’s third acquisition in 13 months. It expands the company's service offerings, and strengthens its presence in the health care and critical infrastructure cybersecurity sector. The acquisition adds to Lumifi's existing offerings, including its 24/7 security operations center (SOC), MDR and ShieldVision platform. Critical Insight's incident response capabilities complement Lumifi's threat monitoring, while its professional services expand the ability to provide tailored cybersecurity strategies. <a href="https://www.channelfutures.com/mergers-acquisitions/lumifi-acquires-critical-insight">Full Story</a></p>
https://www.channelfutures.com/mergers-acquisitions/lumifi-acquires-critical-insight
cybersecurityventures:6728cd4842c30902f0a72cdfMon, 04 Nov 2024 00:00:00 GMTProofpoint Signs Definitive Agreement to Acquire Normalyze<p>Source: Businesswire</p><br><p>Proofpoint Inc., a leading cybersecurity and compliance company, announced it has entered into a definitive agreement to acquire Normalyze, a leader in Data Security Posture Management (DSPM). The acquisition is expected to close in November 2024, subject to customary closing conditions. With this acquisition, Proofpoint will further enhance its human-centric security platform with Normalyze’s leading AI-powered DSPM technology, allowing organizations to discover, classify and protect data at scale across SaaS, PaaS, public or multi-cloud, on-prem and hybrid environments, while prioritizing the reduction of human-centric risks in data security. <a href="https://www.businesswire.com/news/home/20241029400659/en/Proofpoint-Signs-Definitive-Agreement-to-Acquire-Normalyze">Press Release</a></p>
https://www.businesswire.com/news/home/20241029400659/en/Proofpoint-Signs-Definitive-Agreement-to-Acquire-Normalyze
cybersecurityventures:672215775d0a6802c1306c4dWed, 30 Oct 2024 00:00:00 GMTSocure inks $136M deal to acquire AI-powered risk decisioning platform Effectiv<p>Source: FinTech Future</p><br><p>U.S. digital identity verification and fraud prevention platform Socure is set to acquire Effectiv, a San Francisco-based start-up specialising in risk decisioning, for $136 million. Expected to close next month, the deal will see Effectiv’s AI-powered orchestration and decisions platform integrated with Socure’s digital ID tech, enabling Socure to offer real-time payments fraud and anti-money laundering (AML) transaction monitoring as part of a new suite of transaction-level solutions. The acquisition will see the entire Effectiv team join Socure. <a href="https://www.fintechfutures.com/2024/10/socure-inks-136m-deal-to-acquire-ai-risk-decisioning-platform-effectiv/">Full Story</a></p>
https://www.fintechfutures.com/2024/10/socure-inks-136m-deal-to-acquire-ai-risk-decisioning-platform-effectiv/
cybersecurityventures:6720c8bbfd147002e6754a1bTue, 29 Oct 2024 00:00:00 GMTSophos to acquire Secureworks for $859 million<p>Source: The Record</p><br><p>U.K.-based Sophos is acquiring Secureworks, for about $859 million, the two companies announced Oct. 21. Secureworks, based in Atlanta, is currently listed on Nasdaq stock exchange. The all-cash acquisition will is expected to close in early 2025, the companies said. Tech giant Dell owns about 79 percent of Secureworks after taking it public in 2016. Sophos is backed by investment firm Thoma Bravo, which acquired it in 2020 for an estimated $3.9 billion. Both firms are known for producing widely cited cybersecurity research. <a href="https://therecord.media/sophos-to-acquire-secureworks-859-million">Full Story</a></p>
https://therecord.media/sophos-to-acquire-secureworks-859-million
cybersecurityventures:6716788ba91f9902cafb688bMon, 21 Oct 2024 00:00:00 GMTCyera acquires Trail Security for $162M<p>Source: TechCrunch</p><br><p>Cyera, the Israel-founded, U.S.-based cybersecurity unicorn that uses artificial intelligence to build what’s known as data security posture management is acquiring Trail Security, a startup that was still in stealth mode building solutions for data loss prevention. Cyera is paying $162 million for Trail in a mix of cash and shares, Cyera’s CEO and co-founder Yotam Segev told TechCrunch in an interview. Cyera picked up a $300 million Series C at a $1.4 billion valuation in Apr. 2024. TechCrunch has confirmed with sources close to the matter that Cyera is in the process of raising at least $200 million at a pre-money valuation of around $3 billion. <a href="https://techcrunch.com/2024/10/17/cyera-acquires-trail-security-for-162m-cyera-is-now-raising-at-a-3b-valuation/">Full Story</a></p>
https://techcrunch.com/2024/10/17/cyera-acquires-trail-security-for-162m-cyera-is-now-raising-at-a-3b-valuation/
cybersecurityventures:6710f6b270d52f0317a05745Thu, 17 Oct 2024 00:00:00 GMTLeeds Equity Partners Acquires OffSec<p>Source: PR Newswire</p><br><p>Leeds Equity Partners announced that it has acquired OffSec, a provider of continuous cybersecurity workforce development training and professional education for cybersecurity practitioners from Spectrum Equity. Terms of the transaction were not disclosed. OffSec has been providing cybersecurity training for over 15 years, offering practical, hands-on skills development through a proprietary learning platform that includes thousands of hours of content, more than 4,000 labs, and 12 industry-standard certifications. The Company's certifications are globally recognized by employers and cybersecurity practitioners for their rigor and relevance for the most critical cybersecurity roles. <a href="https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html
cybersecurityventures:670fa7b790a44702ff03cfb2Wed, 16 Oct 2024 00:00:00 GMTMarlink Fortifies Cybersecurity Offerings with Port-IT Acquisition<p>Source: MarineLink</p><br><p>Marlink acquired Port-IT, a leader in cybersecurity solutions tailored for the maritime industry. Port-IT brings the combination of a state-of-the-art cybersecurity solutions portfolio together with a long-standing experience in the maritime industry. Marlink Group will create a dedicated cyber security unit, by combining the capabilities of Port-IT, Diverto (a recent managed services acquisition) and its own cybersecurity activities, that will comprise a team of 130 with recognized cybersecurity certifications and long-standing experience in maritime, energy, humanitarian and critical infrastructure sectors, and four Security Operations Centers located in Europe, Asia and Americas. <a href="https://www.marinelink.com/news/marlink-fortifies-cyber-security-offer-518083">Full Story</a></p>
https://www.marinelink.com/news/marlink-fortifies-cyber-security-offer-518083
cybersecurityventures:670e4df404459e02c26d0984Tue, 15 Oct 2024 00:00:00 GMTCrashPlan acquires Parablu to strengthen cloud backup and data resilience offerings<p>Source: siliconANGLE</p><br><p>Cloud protection and backup provider CrashPlan Group LLC announced that it has acquired enterprise data backup and recovery solutions company Parablu Inc. for an undisclosed sum. Founded in 2014, Parablu specializes in providing secure backup and data management solutions with a primary focus on protecting business-critical data in hybrid and multicloud environments. The company offers a suite of services designed to ensure data safety, privacy and regulatory compliance while also protecting against cybersecurity threats, including ransomware. <a href="https://siliconangle.com/2024/10/08/crashplan-acquires-parablu-strengthen-cloud-backup-data-resilience-offerings/">Full Story</a></p>
https://siliconangle.com/2024/10/08/crashplan-acquires-parablu-strengthen-cloud-backup-data-resilience-offerings/
cybersecurityventures:670d0382187772030e14779fMon, 14 Oct 2024 00:00:00 GMTPan-European cybersecurity giant Conscia expands with PlanNet21 acquisition<p>Source: Tech.eu</p><br><p>Conscia, a pan-European provider of cybersecurity and networking solutions for mission-critical IT infrastructure in large organisations has acquired PlanNet21 Group, a provider of cybersecurity, networking, and managed services operating in the Irish and UK markets. Conscia and PlanNet21 Group have both been servicing public organisations and private enterprises with cybersecurity, secure networking, IT infrastructure and hybrid cloud solutions for more than 20 years. Dublin, Ireland-based PlanNet21 Group experienced rapid growth and revenues of close to €70 million last year. <a href="https://tech.eu/2024/10/14/pan-european-cybersecurity-giant-conscia-expands-with-plannet21-acquisition/">Full Story</a></p>
https://tech.eu/2024/10/14/pan-european-cybersecurity-giant-conscia-expands-with-plannet21-acquisition/
cybersecurityventures:670d064f64cd190300a252d5Mon, 14 Oct 2024 00:00:00 GMTSynerion Acquires Qumulex<p>Source: citybiz</p><br><p>Synerion USA Inc., a Southlake, Texas-based provider of cloud-based workforce management software, acquired Qumulex, a Fishers, Ind. innovator in cloud-based video surveillance and access control solutions. This strategic acquisition strengthens Synerion’s portfolio, expanding its offerings into the security market. The integration of Qumulex’s capabilities will enhance Synerion’s offerings in the B2B technology space. Synerion is a leader in Cloud B2B technology and physical access control. With over 40 years of experience, the company serves thousands of customers across a wide range of industries. <a href="https://www.citybiz.co/article/609848/synerion-acquires-qumulex/">Press Release</a></p>
https://www.citybiz.co/article/609848/synerion-acquires-qumulex/
cybersecurityventures:67050fcd1419e80325d25d67Tue, 08 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/today - Success ✔️
```rss
Today's News - Cybercrime Magazine
https://cybersecurityventures.com//today
Today's News - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:31 GMT5Finastra Data Breach: 400GB of Sensitive Client Data Exposed and Sold on Dark Web<p>Source: ClearPhish</p><br><p>London-based Finastra, one of the largest financial technology companies in the world, is investigating a data breach involving the unauthorized access and exfiltration of over 400 gigabytes of data from its internal file transfer platform. On Nov. 7, Finastra's security team detected suspicious activity on its internally hosted file transfer platform. The following day, a cybercriminal using the alias "abyss0" began selling large volumes of files allegedly stolen from Finastra's systems on the dark web. The data purportedly includes sensitive information from some of Finastra's largest banking clients. Finastra employs over 7,000 people and serves around 8,100 financial institutions globally, processing <a href="https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/">massive volumes</a> of digital files tied to financial transactions, according to Dataconomy. <a href="https://www.clearphish.ai/news/finastra-data-breach-400gb-client-data-dark-web">Full Story</a>
</p>
https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/
cybersecurityventures:673dceccc6034f02cf0660c4Thu, 21 Nov 2024 00:00:00 GMTTSA Cyber Disclosure Requirements Worry Natural Gas Companies<p>Source: The Wall Street Journal</p><br><p>The U.S. government is requiring too many intimate details of corporate cybersecurity plans, an executive representing natural-gas companies said at a congressional hearing Nov. 19. It is unclear whether the Transportation Security Administration or any U.S. agency can properly protect such sensitive information, said Kimberly Denbow, vice president of security and operations at the American Gas Association. In more than 300 pages of cybersecurity rules the TSA proposed this month, pipeline and railroad operators must disclose exacting details of their cybersecurity programs. This includes information on their network architecture, the types of cyber software they use, how they test their defenses, their incident-response plans and other details. <a href="https://www.wsj.com/articles/tsa-cyber-disclosure-requirements-worry-natural-gas-companies-c1cbe813">Full Story</a></p>
https://www.wsj.com/articles/tsa-cyber-disclosure-requirements-worry-natural-gas-companies-c1cbe813
cybersecurityventures:673f13fb27775303149eee44Thu, 21 Nov 2024 00:00:00 GMTU.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTMicrosoft Offers Hackers $4 Million For AI And Cloud Vulnerabilities<p>Source: Forbes</p><br><p>In a Nov. 19 announcement, Tom Gallagher, the vice president of engineering at the Microsoft Security Response Center, confirmed the latest move to expand the Microsoft bug bounty program with the launch of what’s it’s calling the <a href="https://www.microsoft.com/en-us/msrc/microsoft-zero-day-quest">Zero Day Quest</a>. The largest hacking event of its kind, according to Gallagher, Zero Day Quest will include $4 million of potential rewards for vulnerabilities impacting cloud and AI. Microsoft has published the rules of engagement for any hackers wanting to participate. Hackers who are unsure if it is safe to proceed, having discovered customer or Microsoft data, for example, should stop and contact bounty@microsoft.com immediately. <a href="https://www.forbes.com/sites/daveywinder/2024/11/20/come-and-hack-us-then-microsoft-says-putting-4-million-up-for-grabs/">Full Story</a></p>
https://www.microsoft.com/en-us/msrc/microsoft-zero-day-quest
cybersecurityventures:673f1921a0316f02b7eb0cb5Thu, 21 Nov 2024 00:00:00 GMTThe Philippine army is recruiting young tech civilians to fight cyberattacks<p>Source: Rest Of World</p><br><p>In response to tens of thousands of threats in recent years, the Philippine government has adopted a new five-year national cybersecurity plan, formed a defense network with the U.S. and Japan, and asked the military to reinforce the security of its systems. The Cyber Battalion, which was set up in 2020, was initially staffed by soldiers. The army then decided to actively recruit civilians. It targets young IT professionals who may be open to lower wages for greater job security and the pride of working for the nation, Lieutenant Colonel Ariel Alejandro, the Cyber Battalion’s commander, told Rest of World. The Cyber Battalion currently has a staff of about 120. The unit has so far hired about 70 civilian experts in their twenties and thirties. <a href="https://restofworld.org/2024/philippines-civilian-tech-cyber-attacks/">Full Story</a></p>
https://restofworld.org/2024/philippines-civilian-tech-cyber-attacks/
cybersecurityventures:673f1abeb25fd502bab01957Thu, 21 Nov 2024 00:00:00 GMTMichigan county rebounding from cyberattack, forced shutdown<p>Source: UpNorthLive ABC 7</p><br><p>The network for Wexford County, Mich. is slowly coming back online after a cyberattack two weeks ago. Wexford County Administrator Joe Porterfield said around Nov. 5 they received an email alert stating there was a network intrusion. All online services were then taken off-line for data to be analyzed for security. Officials are trying to get main office lines and email systems back up. Porterfield said the county has been working with the Michigan State Police Cyber Crimes Unit and the FBI. With some systems still offline, Porterfield recommends that anyone requesting services from the county to call ahead of time to make sure it is available. Wexford has a population of around 31,000. <a href="https://upnorthlive.com/news/local/wexford-county-computer-systems-returning-after-attempted-cyberattack-forced-shutdown">Full Story</a></p>
https://upnorthlive.com/news/local/wexford-county-computer-systems-returning-after-attempted-cyberattack-forced-shutdown
cybersecurityventures:673f1c645159440315f42836Thu, 21 Nov 2024 00:00:00 GMTPentagon and Microsoft Are Investigating Leak of Military Emails<p>Source: Bloomberg</p><br><p>The Defense Department and Microsoft Corp. are investigating an error that exposed at least a terabyte of military emails including personal information and conversations between officials, people familiar with the matter said, an episode that highlighted the security risk of moving sensitive Pentagon data to the cloud. The Pentagon’s Cyber Command has taken the lead on the investigation with Microsoft, which operates the Azure cloud-computing service that stored the data. Information on a U.S. Special Operations Command server was accessible without a password, said the people, who asked not to be identified. Investigators have no sign yet that the exposed data was accessed but were still working to assess the fallout from the leak. <a href="https://finance.yahoo.com/news/pentagon-microsoft-investigating-leak-military-203736994.html?fr=sycsrp_catchall">Full Story</a></p>
https://finance.yahoo.com/news/pentagon-microsoft-investigating-leak-military-203736994.html?fr=sycsrp_catchall
cybersecurityventures:673db38178101502eb249ef1Wed, 20 Nov 2024 00:00:00 GMTSlot Machine Operator International Game Reports Hacker Incident<p>Source: Bloomberg</p><br><p>London-based International Game Technology Plc, operator of popular slot machines in casinos, said an unauthorized third party gained access to certain of its systems. The company has experienced disruptions in portions of its internal IT systems and applications resulting from the incident, according to a filing Nov. 19. IGT activated its cybersecurity incident response plan and launched an investigation with the support of an external adviser. The company also took certain systems offline. The company said it’s in touch with customers and others. IGT delivers best-in-class products and services to legal, regulated public and commercial gaming operators across 100 countries on six continents. <a href="https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true
cybersecurityventures:673dc86a952de802c6d90083Wed, 20 Nov 2024 00:00:00 GMTRussian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTWarning on 500K French supermarket shoppers targeted in cyberattack<p>Source: The Connexion</p><br><p>French supermarket Auchan has warned shoppers to be vigilant after the personal details of more than 500,000 customers were targeted in a cyberattack. The attack has targeted the data of loyalty customers, specifically their names, email addresses, postal addresses, telephone numbers, date of birth, loyalty card number, and family composition (if provided), the retail chain said in an email to affected customers on Nov. 19. The chain urged customers to be “extremely vigilant due to the risk of fraudulent emails, text messages or calls”. <a href="https://www.connexionfrance.com/news/warning-after-data-of-500000-auchan-shoppers-is-targeted-in-cyber-attack/690319">Full Story</a></p>
https://www.connexionfrance.com/news/warning-after-data-of-500000-auchan-shoppers-is-targeted-in-cyber-attack/690319
cybersecurityventures:673dcc9cdff11c02b71727b7Wed, 20 Nov 2024 00:00:00 GMTTop US Cybersecurity Agency chief set to depart before Trump takes over<p>Source: TechRadar Pro</p><br><p>The Director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, is set to vacate her post before President Trump returns to office on Jan. 20 2025, throwing the future of the agency into doubt. CISA is responsible for critical infrastructure protection and improving the U.S. government’s protections against cybercriminals and state actors, who are increasingly targeting American agencies in order to exfiltrate data and disrupt services. Easterly held a number of security positions before taking the post as Director of CISA, such as senior director for counterterrorism on the National Security Council and Global Head of Cybersecurity for Morgan Stanley. <a href="https://www.techradar.com/pro/security/top-us-cybersecurity-agency-chief-set-to-depart-before-trump-takes-over">Full Story</a></p>
https://www.techradar.com/pro/security/top-us-cybersecurity-agency-chief-set-to-depart-before-trump-takes-over
cybersecurityventures:673dcd3ec6034f02cf061ccaWed, 20 Nov 2024 00:00:00 GMTNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems<p>Source: The Hacker News</p><br><p>Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. Some of the prominent sectors targeted by the cybercrime group include IT services, telecommunications, manufacturing, and healthcare. Like other ransomware crews, Helldown is known for leveraging data leak sites to pressure victims into paying ransoms by threatening to publish stolen data, a tactic known as double extortion. It's estimated to have attacked at least 31 companies within a span of three months. <a href="https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html">Full Story</a></p>
https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
cybersecurityventures:673f21d1f4da7b02e37f524aWed, 20 Nov 2024 00:00:00 GMTSpace tech giant Maxar confirms hacker accessed employees’ personal data<p>Source: TechCrunch</p><br><p>U.S. space technology and satellite giant Maxar has confirmed a data breach involving the personal information of its employees. In a <a href="https://oag.ca.gov/ecrime/databreach/reports/sb24-594961">notice</a> filed with California’s attorney general last week, Colorado-headquartered Maxar said a hacker using a Hong Kong-based IP address compromised its network on Oct. 4 to access files containing employee’s personal data. The breach was discovered Oct. 11. Maxar has 2,600 employees — more than half of which attained U.S. security clearances. The company was acquired for $6.4 billion last year by private equity giant Advent International. Maxar hasn’t said how many of its employees were impacted by the breach. <a href="https://techcrunch.com/2024/11/18/satellite-giant-maxar-confirms-hacker-accessed-employees-personal-data/">Full Story</a></p>
https://oag.ca.gov/ecrime/databreach/reports/sb24-594961
cybersecurityventures:673c6a1871f4b602cf57f9b0Tue, 19 Nov 2024 00:00:00 GMTU.S. Library of Congress Hacked By 'Adversary', Emails Accessed<p>Source: NBC News</p><br><p>The U.S. Library of Congress said hackers broke into its communications systems and were able to read its email correspondence with congressional offices for most of this year. In a private notification sent Nov. 15 to some congressional offices, the Library of Congress said that hackers “accessed email communications between congressional offices and some Library staff, including the Congressional Research Service.” The hackers had access from January until September. The Library of Congress, the nation's oldest federal cultural institution and the world’s largest library, offers a dedicated research staff for Congress. Last year, it gave congressional staffers more than 76,000 custom responses to inquiries. <a href="https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662">Full Story</a>
</p>
https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662
cybersecurityventures:673c6bd486081802f4527807Tue, 19 Nov 2024 00:00:00 GMTAI company tells SEC that $250,000 stolen in cyberattack<p>Source: The Record</p><br><p>An artificial intelligence company said a hacker breached its network and stole a $250,000 wire payment. iLearningEngines <a href="https://www.sec.gov/Archives/edgar/data/1835972/000121390024099394/ea0221424-8k_ilearning.htm">filed an 8-K form</a> with the U.S. Securities and Exchange Commission on Nov. 18 notifying the agency of a recent cybersecurity incident. “The ongoing investigation has revealed that a threat actor illegally accessed the Company’s environment and certain files on its network, misdirected a $250,000 wire payment, and deleted a number of email messages,” the company explained. iLearningEngines reported revenues of $135.5 million last quarter, and provides automation tools to more than 1,000 companies across several sectors including healthcare, education and retail. <a href="https://therecord.media/ai-company-loses-250000-in-bec-cyberattack">Full Story</a></p>
https://www.sec.gov/Archives/edgar/data/1835972/000121390024099394/ea0221424-8k_ilearning.htm
cybersecurityventures:673c6f2e86081802f4528bdbTue, 19 Nov 2024 00:00:00 GMTOne Million Websites Vulnerable To Dangerous Sitting Duck Cyberattacks<p>Source: Forbes</p><br><p>A cybersecurity threat known as a sitting duck exploit is thought to be putting more than one million websites at risk of attack, according to threat intelligence analysts. The fact that the attack methodology remains underreported could be the reason why Infoblox security researchers called the discovery of multiple hackers using the vulnerability across widespread cyberattacks eye-opening. A new Infoblox <a href="https://blogs.infoblox.com/threat-intelligence/dns-predators-hijack-domains-to-supply-their-attack-infrastructure/">report</a> has revealed how the threat has evolved into an ongoing attack methodology, the sitting duck vulnerability, and the risks it brings to organizations and consumers alike. <a href="https://www.forbes.com/sites/daveywinder/2024/11/19/1-million-websites-vulnerable-to-dangerous-sitting-duck-cyber-attacks/">Full Story</a></p>
https://blogs.infoblox.com/threat-intelligence/dns-predators-hijack-domains-to-supply-their-attack-infrastructure/
cybersecurityventures:673c709daff65a02a780c4ffTue, 19 Nov 2024 00:00:00 GMTMeta Loses German Court Fight Over Global Data Leak in 2021<p>Source: Bloomberg</p><br><p>Meta Platforms Inc. risks being on the hook for compensation claims from thousands of German users after it lost a top court ruling over the 2021 global leak of half a billion people’s private data. In a groundbreaking ruling, the Federal Court of Justice, Germany’s highest tribunal in civil matters, eased the standard of proof for Facebook users seeking compensation for the data theft. It’s enough to show they were victims of the leak, they don’t have to additionally prove they suffered in a particular way, the court said in a statement on the Nov. 18 judgment. The judgment will guide thousands of cases pending in the country. <a href="https://finance.yahoo.com/news/meta-loses-german-court-fight-142728757.html">Full Story</a></p>
https://finance.yahoo.com/news/meta-loses-german-court-fight-142728757.html
cybersecurityventures:673c71b586081802f452a2a3Tue, 19 Nov 2024 00:00:00 GMTBreach at B2B data broker DemandScience exposes over 100 million records<p>Source: ITPro</p><br><p>Over 100 million leaked records of business contact information listed on the dark web linked to B2B data aggregator DemandScience might have been stolen from a third party, the company has told ITPro. Formerly known as Pure Incubation, DemandScience is an AI-powered B2B demand generation company that helps organizations find potential customers for upcoming campaigns. The firm scrapes the public internet, building an expansive database that marketers and advertisers can use for lead generation. In February, a threat actor named ‘KryptonZambie’ listed Pure Incubation on BreachForums, claiming to have a stolen database containing 183 million records for sale. in August, KryptonZambie made the stolen data cache available for a few dollars, effectively leaking it for free. <a href="https://www.itpro.com/security/cyber-attacks/breach-at-b2b-data-broker-exposes-over-100-million-records">Full Story</a></p>
https://www.itpro.com/security/cyber-attacks/breach-at-b2b-data-broker-exposes-over-100-million-records
cybersecurityventures:673c73f6966d6902c0b15244Tue, 19 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTGermany's statistical office reports possible data leak<p>Source: DPA International</p><br><p>Germany's Federal Statistical Office (Destatis) has suspended a digital reporting system for authorities after indications of a possible data leak, it announced on Nov. 15. "The security authorities have been called in and the Federal Office for Information Security is analysing the situation," the office in the western city of Wiesbaden said. Germany's Interior Ministry referred to the case as a "cyber incident." A spokesman from the ministry said login details for a data reporting platform called IDEV, operated by Destatis and used to send data to the regional and federal government offices, as well as a data set of about 3.8 gigabytes with allegedly captured information, had been offered on a darknet forum. <a href="https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html">Full Story</a><span></span></p>
https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html
cybersecurityventures:673b2c4acd83ec02f56947beMon, 18 Nov 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/intrusion-daily-cyber-threat-alert - Success ✔️
```rss
Cyberattacks - Cybercrime Magazine
https://cybersecurityventures.com//intrusion-daily-cyber-threat-alert
Cyberattacks - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:32 GMT5Finastra Data Breach: 400GB of Sensitive Client Data Exposed and Sold on Dark Web<p>Source: ClearPhish</p><br><p>London-based Finastra, one of the largest financial technology companies in the world, is investigating a data breach involving the unauthorized access and exfiltration of over 400 gigabytes of data from its internal file transfer platform. On Nov. 7, Finastra's security team detected suspicious activity on its internally hosted file transfer platform. The following day, a cybercriminal using the alias "abyss0" began selling large volumes of files allegedly stolen from Finastra's systems on the dark web. The data purportedly includes sensitive information from some of Finastra's largest banking clients. Finastra employs over 7,000 people and serves around 8,100 financial institutions globally, processing <a href="https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/">massive volumes</a> of digital files tied to financial transactions, according to Dataconomy. <a href="https://www.clearphish.ai/news/finastra-data-breach-400gb-client-data-dark-web">Full Story</a>
</p>
https://dataconomy.com/2024/11/20/finastra-investigates-data-breach-affecting-client-files/
cybersecurityventures:673dceccc6034f02cf0660c4Thu, 21 Nov 2024 00:00:00 GMTSlot Machine Operator International Game Reports Hacker Incident<p>Source: Bloomberg</p><br><p>London-based International Game Technology Plc, operator of popular slot machines in casinos, said an unauthorized third party gained access to certain of its systems. The company has experienced disruptions in portions of its internal IT systems and applications resulting from the incident, according to a filing Nov. 19. IGT activated its cybersecurity incident response plan and launched an investigation with the support of an external adviser. The company also took certain systems offline. The company said it’s in touch with customers and others. IGT delivers best-in-class products and services to legal, regulated public and commercial gaming operators across 100 countries on six continents. <a href="https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-19/slot-machine-operator-international-game-reports-hacker-incident?embedded-checkout=true
cybersecurityventures:673dc86a952de802c6d90083Wed, 20 Nov 2024 00:00:00 GMTU.S. Library of Congress Hacked By 'Adversary', Emails Accessed<p>Source: NBC News</p><br><p>The U.S. Library of Congress said hackers broke into its communications systems and were able to read its email correspondence with congressional offices for most of this year. In a private notification sent Nov. 15 to some congressional offices, the Library of Congress said that hackers “accessed email communications between congressional offices and some Library staff, including the Congressional Research Service.” The hackers had access from January until September. The Library of Congress, the nation's oldest federal cultural institution and the world’s largest library, offers a dedicated research staff for Congress. Last year, it gave congressional staffers more than 76,000 custom responses to inquiries. <a href="https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662">Full Story</a>
</p>
https://www.nbcnews.com/tech/security/library-congress-says-hackers-accessed-emails-lawmakers-offices-rcna180662
cybersecurityventures:673c6bd486081802f4527807Tue, 19 Nov 2024 00:00:00 GMTGermany's statistical office reports possible data leak<p>Source: DPA International</p><br><p>Germany's Federal Statistical Office (Destatis) has suspended a digital reporting system for authorities after indications of a possible data leak, it announced on Nov. 15. "The security authorities have been called in and the Federal Office for Information Security is analysing the situation," the office in the western city of Wiesbaden said. Germany's Interior Ministry referred to the case as a "cyber incident." A spokesman from the ministry said login details for a data reporting platform called IDEV, operated by Destatis and used to send data to the regional and federal government offices, as well as a data set of about 3.8 gigabytes with allegedly captured information, had been offered on a darknet forum. <a href="https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html">Full Story</a><span></span></p>
https://www.yahoo.com/news/germanys-statistical-office-reports-possible-212717403.html
cybersecurityventures:673b2c4acd83ec02f56947beMon, 18 Nov 2024 00:00:00 GMTHungary confirms hack of defense procurement agency<p>Source: The Record</p><br><p>Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.” On Nov. 14, the cybercrime group known as INC Ransomware claimed access to the agency's data and posted sample screenshots on its dark web portal. Prime Minister Viktor Orbán's chief of staff, Gergely Gulyás, attributed the attack to a "hostile foreign, non-state hacker group" without naming the group. Hungarian news outlet Magyar Hang <a href="https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482">reported</a> that the INC Ransomware gang breached the agency’s servers, downloading and encrypting all files. The hackers are reportedly demanding $5 million in ransom. Hungary is a member of the NATO alliance. <a href="https://therecord.media/hungary-defense-procurement-agency-hacked">Full Story</a>
</p>
https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482
cybersecurityventures:67372daeda9abc02fa3e74d7Fri, 15 Nov 2024 00:00:00 GMTUS confirms China-backed hackers breached telecom providers to steal wiretap data<p>Source: TechCrunch</p><br><p>The U.S. government has confirmed that hackers with links to China breached multiple U.S. telecommunication service providers to access the wiretap systems used by law enforcement to surveil Americans. In a <a href="https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications">joint statement</a> published Nov. 11, CISA and the FBI said they had uncovered “a broad and significant” cyber espionage campaign that saw PRC-affiliated actors compromise networks at “multiple telecommunications companies” in the U.S. CISA and the FBI did not name the breached organizations, but AT&T, Lumen (formerly CenturyLink) and Verizon are among the telecom providers whose networks were breached, <a href="https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b">according to The Wall Street Journal</a>. <a href="https://techcrunch.com/2024/11/14/us-confirms-china-backed-hackers-breached-telecom-providers-to-steal-wiretap-data/">Full Story</a>
</p>
https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications
cybersecurityventures:6735d25675490c02d77bd2f3Thu, 14 Nov 2024 00:00:00 GMTChinese hackers target Tibetan websites in malware attack<p>Source: Tech Xplore</p><br><p>A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan community in an attack meant to install malware on users' computers, <a href="https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites">according to Insikt Group</a>, the threat research division of Somerville, Mass.-based Recorded Future. The hack of the Tibet Post and Gyudmed Tantric University websites, both located in India, appears geared toward obtaining access to the computers of people visiting to obtain information on them and their activities. The sites were first compromised in May. Gyudmed Tantric University is a place of learning about Tibetan Buddhism, language, history and culture. The Tibet Post is known for promoting democracy, freedom of speech and for advocating Tibetan independence from China. <a href="https://techxplore.com/news/2024-11-chinese-hackers-tibetan-websites-malware.html">Full Story</a>
</p>
https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
cybersecurityventures:673486dbf6798402d2d9b851Wed, 13 Nov 2024 00:00:00 GMTNew England grocery stores, pharmacies impacted by cyberattack<p>Source: Boston.com</p><br><p>Stop & Shop locations have been the target of a cybersecurity attack, according to a Nov. 8 <a href="https://newsroom.aholddelhaize.com/ahold-delhaize-statement-on-ahold-delhaize-usa-cybersecurity-issue/">press release</a>. Parent company Ahold Delhaize detected a “cybersecurity issue” within their U.S. systems, notified law enforcement and began an investigation. It was unclear when the networks would be back up and running. The breach has affected pharmacies and e-commerce online, and delayed product deliveries. Hannaford Supermarkets and <a href="https://www.wral.com/story/food-lion-hit-by-cyberattack/21717747/">Food Lion</a>, both owned by Ahold Delhaize, experienced technical issues. The Netherlands-based Ahold Delhaize is one of the world’s largest food retail groups with 7,716 local stores, 402,000+ associates, and 63 million shoppers each week. <a href="https://www.boston.com/news/local-news/2024/11/11/new-england-grocery-stores-feeling-effects-of-cyber-attack/">Full Story</a>
</p>
https://newsroom.aholddelhaize.com/ahold-delhaize-statement-on-ahold-delhaize-usa-cybersecurity-issue/
cybersecurityventures:6733346fa6e10d02a40ba253Tue, 12 Nov 2024 00:00:00 GMTCyberattack temporarily blocks Israeli credit card payments<p>Source: The Times of Israel</p><br><p>An Israeli clearing company was targeted in a cyberattack on Nov. 10 leaving some people unable to use their credit cards to shop in stores for several hours. Channel 12 news and Army Radio both reported that an Iran-linked hacker group took responsibility for the attack, without citing sources or giving further details. In the incident, a DDoS attack targeted payment solution company Hyp, which is used by companies across Israel including the Maccabi health fund, taxi service Gett, food ordering app Wolt, and public transportation payment systems Rav Kav Online and Hop-On. The attack also interfered with some operations on Bit, the popular digital payment app operated by Bank Hapoalim, similar to the US-based Venmo. <a href="https://www.timesofisrael.com/ddos-cyberattack-temporarily-blocks-israeli-credit-card-payments/">Full Story</a></p>
https://www.timesofisrael.com/ddos-cyberattack-temporarily-blocks-israeli-credit-card-payments/
cybersecurityventures:6731e0534ea7350315ebc5acMon, 11 Nov 2024 00:00:00 GMTOutages impact Washington state courts after ‘unauthorized activity’ detected on network<p>Source: The Record</p><br><p>A potential cyber intrusion is causing outages within court systems across the state of Washington this week. On Nov. 4, the Washington State Administrative Office of the Courts (AOC) <a href="https://www.facebook.com/washingtoncourts/posts/989279419892942">warned</a> state residents that it “recently identified unauthorized activity on the Washington Courts network.” The outages have affected courts in the counties of Thurston, Monroe, Renton, Puyallup, Bainbridge, King, Pierce, Whatcom, and Lewis as well as municipal courts in several cities. “We have taken immediate action to secure critical systems and are working to safely restore service. Please be advised that there will be intermittent impacts to accessibility of our public website and systems in the coming days as we continue to restore services,” the AOC said. <a href="https://therecord.media/outages-washington-courts-cyber-activity">Full Story</a>
</p>
https://www.facebook.com/washingtoncourts/posts/989279419892942
cybersecurityventures:672defac0186d1029c87664dFri, 08 Nov 2024 00:00:00 GMTLos Angeles housing authority admits data breach following ransomware attack<p>Source: TechRadar Pro</p><br><p>The Housing Authority of the City of Los Angeles (HACLA) has suffered its second ransomware attack in as many years. Threat actors known as Cactus added HACLA to its data leak website, claiming to have stolen 891 gigabytes of files from the organization. The archives reportedly include, "personal Identifiable Information, actual database backups, financial documents, executives\employees personal data, customer personal information, corporate confidential data and correspondence.” A small sample was posted as proof of the claims, and soon after, <a href="https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/">HACLA confirmed the news to BleepingComputer</a> Nov. 1, saying it was currently investigating the incident. <a href="https://www.techradar.com/pro/security/la-housing-authority-admits-data-breach-following-ransomware-attack">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/
cybersecurityventures:672ca8146951f40c2a40eb65Thu, 07 Nov 2024 00:00:00 GMTSerco tracking devices on UK prison vans disabled after cyberattack<p>Source: Financial Times</p><br><p>Serco’s tracking devices and panic alarms on prison vans were disabled after a cyberattack last week on a service provider for the UK outsourcing giant. In an incident that also affected the operations of international express mail courier DHL, hackers targeted AIM-listed Microlise, whose tracking software provides protection for Serco employees and prisoners, ensuring their whereabouts are known at all times. Microlise notified the London Stock Exchange about the attack on Oct. 31. Serco operates prisoner escort and custody services for the Ministry of Justice. It is the company’s largest services contract of this kind with more than 300,000 prisoner movements under its charge each year. <a href="https://www.ft.com/content/84753e89-b769-42fb-ac85-a76b91c3fe1f">Full Story</a></p>
https://www.ft.com/content/84753e89-b769-42fb-ac85-a76b91c3fe1f
cybersecurityventures:672b55f3b7f2e40326220050Wed, 06 Nov 2024 00:00:00 GMTSchneider Electric Investigates Cyber Incident. Hacker Claimed To Steal 40GB Of Data<p>Source: CRN</p><br><p>Schneider Electric said in a statement to CRN Nov. 4 that it was “investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms.” The platform is hosted inside of an “isolated” environment, according to Schneider Electric, a French multi-national technology provider in segments including power management and industrial automation. BleepingComputer reports that <a href="https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/">a threat actor claimed to steal 40GB of data</a> from the company's JIRA server. On Nov. 3, a threat actor known as "Grep" <a href="https://x.com/grepcn/status/1853089027777261941">taunted</a> Schneider Electric on X, indicating they had breached its systems. <a href="https://www.crn.com/news/security/2024/schneider-electric-investigating-security-incident-after-reported-hacker-claims">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
cybersecurityventures:672a081566237f02a3372d37Tue, 05 Nov 2024 00:00:00 GMTCalifornia court suffering from tech outages after cyberattack<p>Source: The Record</p><br><p>The San Joaquin County Superior Court said nearly all of its digital services have been knocked offline due to a cyberattack that began last week. The court first <a href="https://www.facebook.com/SJSuperiorCourt/posts/933901012105934">warned</a> the county’s nearly 800,000 residents of technology issues on Oct. 30 before <a href="https://www.facebook.com/SJSuperiorCourt/posts/934737472022288">admitting</a> that it was a cybersecurity incident the next day. The attack knocked out all of the court’s phone and fax services, websites containing juror reporting instructions, the e-filing platform, credit card payment processing and more. Some jurors scheduled to serve were excused. Cybersecurity experts have been hired to support the court’s efforts to remediate the issue and investigate the incident. The court does not have a timeline for when systems will be restored. <a href="https://therecord.media/california-court-suffering-from-tech-outages-cyberattack">Full Story</a></p>
https://www.facebook.com/SJSuperiorCourt/posts/933901012105934
cybersecurityventures:6728c11d10c02e02b4f0917fMon, 04 Nov 2024 00:00:00 GMTChinese state-backed hackers breached 20 Canadian government networks over four years, agency warns<p>Source: The Record</p><br><p>Chinese government-backed hackers have compromised at least 20 Canadian government networks over the last four years, Canada’s top cyber agency said Oct. 30. Calling the threat from China in cyberspace “second to none,” the Canadian Centre for Cyber Security (CCCS) said Beijing’s operations “serve high-level political and commercial objectives, including espionage, IP theft, malign influence, and transnational repression.” Summarized in its National Cyber Threat Assessment 2025-2026, a biennial <a href="https://www.cyber.gc.ca/sites/default/files/national-cyber-threat-assessment-2025-2026-e.pdf">report</a> intended to warn the public of threats and to guide cybersecurity strategy, the CCCS said Canadian critical infrastructure, industry — including the research and development sector — and government agencies have all been targeted by Chinese actors. <a href="https://therecord.media/canada-20-government-agencies-hacked-china-last-four-years">Full Story</a></p>
https://www.cyber.gc.ca/sites/default/files/national-cyber-threat-assessment-2025-2026-e.pdf
cybersecurityventures:6724b1526826a00303b8aafaFri, 01 Nov 2024 00:00:00 GMTPeru's Interbank reports data breach potentially affecting 2M+ customers<p>Source: El Popular</p><br><p>Interbank acknowledged a massive hack in its banking system affecting more than 2 million customers on Oct. 30. The Peru-based bank reported that an unauthorized person accessed its database, exposing the personal information of some clients, and that a specialized team is working intensively to resolve the incident and restore the operation of its main service channels. Interbank states that after completing a technical review, all operations will be reactivated immediately. "It is worrying that a bank of that size has reacted so poorly in terms of prevention, reaction and mitigation of the damage done," Carlos Zuñiga, president of the Consumer Defense Association Elegir Perú, <a href="https://elcomercio.pe/economia/peru/interbank-sobre-filtracion-de-datos-de-usuarios-garantizamos-la-seguridad-de-sus-depositos-y-productos-financieros-i-ultimas-noticia/?ref=ecr">told El Comercio</a>. <a href="https://elpopular.pe/actualidad/2024/10/30/interbank-hacker-revela-el-motivo-por-el-cual-filtro-los-datos-de-usuarios-el-banco-no-ha-cumplido-con-sus-promesas-1594590">Full Story</a>
</p>
https://elcomercio.pe/economia/peru/interbank-sobre-filtracion-de-datos-de-usuarios-garantizamos-la-seguridad-de-sus-depositos-y-productos-financieros-i-ultimas-noticia/?ref=ecr
cybersecurityventures:67236e1a1adf2102d0df62d9Thu, 31 Oct 2024 00:00:00 GMTMoneyGram replaces CEO weeks after massive customer data breach<p>Source: TechCrunch</p><br><p>Money transfer giant MoneyGram has replaced its chief executive less than a month after confirming that hackers stole reams of customers’ personal information and transaction records in a data breach. In a statement Oct. 28, MoneyGram said it appointed Anthony Soohoo as the company’s chief executive with immediate effect. Soohoo replaces Alex Holmes, who joined MoneyGram in 2009 and served as its CFO, then COO, before being appointed CEO and chairman in 2016. Holmes’ removal comes in the same month that the company confirmed it had lost an unspecified amount of personal customer information during its <a href="https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/">recent cyberattack</a>. The company has yet to describe the nature of the attack, which sparked in a week-long outage of its money transfer service. <a href="https://techcrunch.com/2024/10/29/moneygram-replaces-ceo-weeks-after-massive-customer-data-breach/">Full Story</a></p>
https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/
cybersecurityventures:672213c735284e02fbddc4d7Wed, 30 Oct 2024 00:00:00 GMTHacker group targets end-of-life pharmacy provider<p>Source: TechInformed</p><br><p>OnePoint Patient Care, an Arizona-based hospice pharmacy serving over 40,000 patients per day, has informed customers about a data breach impacting personal information. OnePoint said it first detected suspicious activity on its network in early August. A later investigation revealed that by this point, the attackers had already obtained files containing personal information from the pharmacy’s systems, including names, residence information, medical records, and prescription and diagnosis information. OPPC told the U.S. Department of Health and Human Services that the data breach impacted over 795,000 people. Inc Ransomware, an extortion operation, has taken credit for the attack, listing the company on its Tor-based leak website. <a href="https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/">Full Story</a></p>
https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/
cybersecurityventures:6720c26c63a259028cc22e37Tue, 29 Oct 2024 00:00:00 GMTRansomHub gang allegedly behind attack on Mexican airport operator<p>Source: The Record</p><br><p>A hacking group recently spotlighted by U.S. agencies said it is responsible for an attack targeting an operator of 13 airports across Mexico. Grupo Aeroportuario del Centro Norte <a href="https://www.oma.aero/assets/005/6312.pdf">announced</a> Oct. 18 that a cyber incident forced its IT team to turn to backup systems in an effort to continue running the airports it controls across central and northern Mexico. Known colloquially as OMA, the company runs airports in Monterrey and other major Mexican cities, handling more than 19 million passengers so far this year. On Oct. 24, the RansomHub operation claimed to be responsible for the incident, and threatened to leak 3 terabytes of stolen data if an undisclosed ransom is not paid. <a href="https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator">Full Story</a></p>
https://www.oma.aero/assets/005/6312.pdf
cybersecurityventures:671f6cce1698c502bafb63e3Mon, 28 Oct 2024 00:00:00 GMTChange Healthcare hack affects over 100M, largest-ever US healthcare breach<p>Source: TechCrunch</p><br><p>More than 100 million individuals had their private health information stolen during the ransomware attack on Change Healthcare in February, a cyberattack that caused months of unprecedented outages and widespread disruption across the U.S. healthcare sector. This is the first time that UnitedHealth Group (UHG), the U.S. health insurance provider that owns the health tech company, has put a number of affected individuals to the data breach, after previously saying it anticipated the breach to include data on a “substantial proportion of people in America.” The U.S. Department of Health and Human Services <a href="https://www.documentcloud.org/documents/25250169-change-healthcare-breach">first reported the updated number</a> on its data breach portal on Oct. 24. <a href="https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/">Full Story</a></p>
https://www.documentcloud.org/documents/25250169-change-healthcare-breach
cybersecurityventures:671b7b510ed19003054c7bbcFri, 25 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/ransomware-minute - Success ✔️
```rss
Ransomware - Cybercrime Magazine
https://cybersecurityventures.com//ransomware-minute
Ransomware - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:33 GMT5Russian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems<p>Source: The Hacker News</p><br><p>Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. Some of the prominent sectors targeted by the cybercrime group include IT services, telecommunications, manufacturing, and healthcare. Like other ransomware crews, Helldown is known for leveraging data leak sites to pressure victims into paying ransoms by threatening to publish stolen data, a tactic known as double extortion. It's estimated to have attacked at least 31 companies within a span of three months. <a href="https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html">Full Story</a></p>
https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
cybersecurityventures:673f21d1f4da7b02e37f524aWed, 20 Nov 2024 00:00:00 GMTHungary confirms hack of defense procurement agency<p>Source: The Record</p><br><p>Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.” On Nov. 14, the cybercrime group known as INC Ransomware claimed access to the agency's data and posted sample screenshots on its dark web portal. Prime Minister Viktor Orbán's chief of staff, Gergely Gulyás, attributed the attack to a "hostile foreign, non-state hacker group" without naming the group. Hungarian news outlet Magyar Hang <a href="https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482">reported</a> that the INC Ransomware gang breached the agency’s servers, downloading and encrypting all files. The hackers are reportedly demanding $5 million in ransom. Hungary is a member of the NATO alliance. <a href="https://therecord.media/hungary-defense-procurement-agency-hacked">Full Story</a>
</p>
https://hang.hu/belfold/hackertamadas-katonai-adatokra-meg-a-huszar-mentek-atpremezesenek-ara-is-kiszivargott-169482
cybersecurityventures:67372daeda9abc02fa3e74d7Fri, 15 Nov 2024 00:00:00 GMTYMCA of Central Florida suffers data breach, nearly 12,000 affected<p>Source: Orlando Inno</p><br><p>The YCMA of Central Florida suffered a data breach in May, according to the nonprofit's filing. The breach exposed sensitive information of thousands of local members, prompting new security measures and other actions. <a href="https://www.comparitech.com/news/florida-ymca-notifies-12k-people-of-data-breach-compromising-ssns/">Nearly 12,000 people were notified of the breach</a> that compromised the following info: Names; Social Security numbers; Financial account numbers; Personal health information; USCIS numbers; Passport numbers; Dates of birth; Driver’s license numbers; and Mailing addresses; Ransomware gang LockBit claimed responsibility for the breach in early June. It posted what it says are scans of IDs and other documents as proof of its claim. <a href="https://www.bizjournals.com/orlando/inno/stories/news/2024/11/13/ymca-central-florida-data-breach-credit-monitoring.html">Full Story</a></p>
https://www.comparitech.com/news/florida-ymca-notifies-12k-people-of-data-breach-compromising-ssns/
cybersecurityventures:6735da2aba956f02a122b45eThu, 14 Nov 2024 00:00:00 GMTTexas Oilfield system supplier Newpark Resources hit by ransomware<p>Source: Cybernews</p><br><p>Newpark Resources, a supplier of fluid systems and industrial solutions to the oil and gas industry, disclosed a ransomware incident that caused disruptions. In a filing with the US Securities and Exchange Commission, the company said it detected a ransomware cybersecurity incident on Oct. 29.. An unauthorized third party gained access to internal information systems. “Upon detection, the Company activated its cybersecurity response plan and launched an investigation internally with the support of external advisors to assess and to contain the threat,” the Newpark’s <a href="https://www.sec.gov/Archives/edgar/data/71829/000007182924000111/nr-20241029.htm">statement</a> reads. <a href="https://cybernews.com/security/newpark-resources-hit-by-ransomware/">Full Story</a></p>
https://www.sec.gov/Archives/edgar/data/71829/000007182924000111/nr-20241029.htm
cybersecurityventures:672df119b94aa103215454c9Fri, 08 Nov 2024 00:00:00 GMTLos Angeles housing authority admits data breach following ransomware attack<p>Source: TechRadar Pro</p><br><p>The Housing Authority of the City of Los Angeles (HACLA) has suffered its second ransomware attack in as many years. Threat actors known as Cactus added HACLA to its data leak website, claiming to have stolen 891 gigabytes of files from the organization. The archives reportedly include, "personal Identifiable Information, actual database backups, financial documents, executives\employees personal data, customer personal information, corporate confidential data and correspondence.” A small sample was posted as proof of the claims, and soon after, <a href="https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/">HACLA confirmed the news to BleepingComputer</a> Nov. 1, saying it was currently investigating the incident. <a href="https://www.techradar.com/pro/security/la-housing-authority-admits-data-breach-following-ransomware-attack">Full Story</a></p>
https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/
cybersecurityventures:672ca8146951f40c2a40eb65Thu, 07 Nov 2024 00:00:00 GMTINTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime<p>Source: The Hacker News</p><br><p>INTERPOL on Nov. 5 said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from Apr. 1 to Aug. 31, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 percent were taken down and 59 servers were seized," INTERPOL said. "Additionally, 43 electronic devices, including laptops, mobile phones and hard disks were seized." The actions also led to the arrest of 41 individuals, with 65 others still under investigation. <a href="https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html">Full Story</a></p>
https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html
cybersecurityventures:672b592ca17ab302ac9b5927Wed, 06 Nov 2024 00:00:00 GMTRural Georgia Hospital Hit By Ransomware<p>Source: WALB News 10</p><br><p>A ransomware attack is impacting the Electronic Health Record system at the Memorial Hospital and Manor in Bainbridge, Ga. according to a Facebook post. “While we believe this issue will not impact either the level or the quality of care we provide to our patients, we want to be fully transparent regarding this situation.” The attack was discovered early Nov. 2 when employees were seeking notifications of potential risks found by their virus protection software. The hospital said they are currently evaluating their plan for restoration and recovery. The 80-bed community hospital and 107-bed long-term care facility is owned and operated by the Hospital Authority of the City of Bainbridge and Decatur County. <a href="https://www.walb.com/2024/11/03/memorial-hospital-manor-investigating-cyber-attack/">Full Story</a>
</p>
https://www.walb.com/2024/11/03/memorial-hospital-manor-investigating-cyber-attack/
cybersecurityventures:672a0f0166237f02a337e676Tue, 05 Nov 2024 00:00:00 GMTHacker group targets end-of-life pharmacy provider<p>Source: TechInformed</p><br><p>OnePoint Patient Care, an Arizona-based hospice pharmacy serving over 40,000 patients per day, has informed customers about a data breach impacting personal information. OnePoint said it first detected suspicious activity on its network in early August. A later investigation revealed that by this point, the attackers had already obtained files containing personal information from the pharmacy’s systems, including names, residence information, medical records, and prescription and diagnosis information. OPPC told the U.S. Department of Health and Human Services that the data breach impacted over 795,000 people. Inc Ransomware, an extortion operation, has taken credit for the attack, listing the company on its Tor-based leak website. <a href="https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/">Full Story</a></p>
https://techinformed.com/onepoint-a-new-low-hacker-group-targets-end-of-life-pharmacy-provider/
cybersecurityventures:6720c26c63a259028cc22e37Tue, 29 Oct 2024 00:00:00 GMTFour REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions<p>Source: The Hacker News</p><br><p>Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant <a href="https://www.kommersant.ru/doc/7263987">reported</a> that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov guilty of illegal circulation of means of payment. Puzyrevsky and Khansvyarov have also been found guilty of using and distributing malware. Zaets and Malozemov were sentenced to 4.5 and 5 years in prison. Khansvyarov and Puzyrevsky received a jail term of 5.5 and 6 years, respectively. <a href="https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html">Full Story</a></p>
https://www.kommersant.ru/doc/7263987
cybersecurityventures:671f6db1764f4702e43b13d7Mon, 28 Oct 2024 00:00:00 GMTChange Healthcare hack affects over 100M, largest-ever US healthcare breach<p>Source: TechCrunch</p><br><p>More than 100 million individuals had their private health information stolen during the ransomware attack on Change Healthcare in February, a cyberattack that caused months of unprecedented outages and widespread disruption across the U.S. healthcare sector. This is the first time that UnitedHealth Group (UHG), the U.S. health insurance provider that owns the health tech company, has put a number of affected individuals to the data breach, after previously saying it anticipated the breach to include data on a “substantial proportion of people in America.” The U.S. Department of Health and Human Services <a href="https://www.documentcloud.org/documents/25250169-change-healthcare-breach">first reported the updated number</a> on its data breach portal on Oct. 24. <a href="https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/">Full Story</a></p>
https://www.documentcloud.org/documents/25250169-change-healthcare-breach
cybersecurityventures:671b7b510ed19003054c7bbcFri, 25 Oct 2024 00:00:00 GMTHenry Schein breach probe reveals massive scope, 5X+ more than initial calculations<p>Source: Cybernews</p><br><p>Melville, N.Y.-based Henry Schein, a dental and medical supplies giant, finalized a lengthy inquiry into a devastating 2023 ransomware attack, revealing its massive scope. The incursion was carried out by the now-defunct ALPHV/BlackCat ransomware cartel, a once prominent Russia-linked gang whose damages ballooned to tens of millions of dollars worldwide. During the attack, cybercrooks claimed that they’d stolen a whopping 35 TB of data in total, including sensitive details such as patient medical histories and treatment and insurance details. The investigation, which Henry Schein claims “required substantial time and resources,” revealed that over 166,000 individuals were exposed in the attack, 5.5 times more than initial calculations said. <a href="https://cybernews.com/privacy/henry-schein-breach-probe-surges-victim-count/">Full Story</a></p>
https://cybernews.com/privacy/henry-schein-breach-probe-surges-victim-count/
cybersecurityventures:671b7cbb0263af03155b7533Fri, 25 Oct 2024 00:00:00 GMTRansomware gang stoops to new low, targets prominent nonprofit for disabled people<p>Source: The Record</p><br><p>A notorious ransomware gang previously responsible for attacks on multiple hospitals has now claimed a new victim: disability nonprofit Easterseals. The Rhysida ransomware group stooped to new lows this week when it attempted to extort $1.3 million from the organization, which provides support to disabled children, seniors, military veterans and others. Rhysida ransomware actors posted the organization on its leak site this week, demanding 20 bitcoin by Oct. 30. The nonprofit is one of the oldest disability-focused organizations in the U.S., serving more than 1.5 million people across the country and providing additional services to 100,000 physicians who care for those in need. <a href="https://therecord.media/easterseals-central-illinois-data-breach">Full Story</a></p>
https://therecord.media/easterseals-central-illinois-data-breach
cybersecurityventures:671a287310380102ce8ba44bThu, 24 Oct 2024 00:00:00 GMTNidec confirms ransomware attack leaked company data online<p>Source: TechRadar Pro</p><br><p>Threat actors breached Nidec Corporation earlier this year and have now leaked stolen data on the dark web. In an announcement, the company explained that a hacker stole valid VPN account information from a Nidec employee, and used it to access a server holding sensitive information consisting of 50,694 files, including internal documents, letters from business partners, documents related to green procurement, labor safety and health policies, business documents (purchase orders, invoices, receipts), contracts, and more. No ransom has been paid. Nidec Corporation is a Japanese multinational company specializing in electric motor technology, producing a wide range of motors for applications such as automotive, industrial, and home appliances. <a href="https://www.techradar.com/pro/security/nidec-confirms-ransomware-attack-leaked-company-data-online">Full Story</a>
</p>
https://www.techradar.com/pro/security/nidec-confirms-ransomware-attack-leaked-company-data-online
cybersecurityventures:6718d9a424142a03135b3430Wed, 23 Oct 2024 00:00:00 GMT93K People Impacted By Transak Data Breach<p>Source: CoinDesk</p><br><p>A crypto industry employee's use of a laptop for non-work purposes is reportedly at the heart of a data breach involving some 93,000 unique users – and now a ransomware group is attempting to negotiate with the company that was targeted. Transak, an "onramp" used by a number of popular blockchain companies to allow customers to buy cryptocurrencies, disclosed in a <a href="https://transak.com/blog/transak-security-incident-oct-2024">blog post</a> on Oct. 21 that it had fallen victim to a data breach. According to Transak, the leaked data was limited to "names" and "basic identity information." In an interview with CoinDesk, Transak CEO Sami Start said that 93,000 people were impacted by the breach, which included passports, ID cards and selfies used by customers to verify their identities with crypto financial products. <a href="https://www.coindesk.com/tech/2024/10/21/crypto-on-ramp-service-transak-targeted-in-data-breach/">Full Story</a></p>
https://transak.com/blog/transak-security-incident-oct-2024
cybersecurityventures:67178b91c8cf6d030138f4c1Tue, 22 Oct 2024 00:00:00 GMTRhode Island Students’ Sensitive Data Exposed in Cyberattack<p>Source: The 74</p><br><p>Sexual misconduct allegations involving both students and teachers, children’s special education records and their vaccine histories are readily available online after the Providence, R.I. school district fell victim to a <a href="https://rhodeislandcurrent.com/2024/09/18/the-clock-is-running-on-ransomware-attack-against-providence-schools/">cyberattack last month</a>. A ransomware gang uploaded those and other sensitive student information to an instant messaging service after Providence Public Schools failed to pay their $1 million extortion demand, an investigation by The 74 revealed. An analysis of the stolen files — posted by the threat actors to the messaging platform Telegram — indicates the 217 gigabyte data leak includes students’ specific special education accommodations and medications. Other files offer detailed insight into district investigations into sexual misconduct allegations naming educators and students. <a href="https://www.yahoo.com/news/providence-students-sensitive-data-exposed-103000777.html">Full Story</a></p>
https://rhodeislandcurrent.com/2024/09/18/the-clock-is-running-on-ransomware-attack-against-providence-schools/
cybersecurityventures:67124396ffcff202b655764aFri, 18 Oct 2024 00:00:00 GMTBritish intelligence services to protect all UK schools from ransomware attacks<p>Source: The Record</p><br><p>Schools across the UK are being encouraged to sign up for a free service developed inside the country’s security and intelligence services that would help protect them from ransomware attacks and other threats. Cyberattacks affecting schools can pose a severe risk to children, not only in disrupting their access to education and the other services schools provide, but also by publishing sensitive documents regarding at-risk students in extortion attempts. The National Cyber Security Centre (NCSC) — a part of the signals and cyber intelligence agency GCHQ — <a href="https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions">announced</a> that it was rolling out its PDNS (Protective Domain Name System) for Schools service nationally. <a href="https://therecord.media/uk-pdns-schools-cyberdefense-intelligence-services">Full Story</a></p>
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions
cybersecurityventures:670efc0b0d259e03061a3671Tue, 15 Oct 2024 00:00:00 GMTHackers demand $1.5M for patient data after Colorado health system breach<p>Source: Becker's Health IT</p><br><p>Axis Health System identified a cyberattack affecting operations, including its primary care patient portal, according to the health system's website. Axis, a network of 13 behavioral health facilities in Colorado, followed incident response protocol after identifying the attack and its investigation is ongoing. The system has not confirmed whether patient data was affected. The Rhysida ransomware gang claimed responsibility for the attack and requested $1.58 million in bitcoin to avoid having patient data exposed, according to an Oct. 10 <a href="https://x.com/H4ckManac/status/1844453256120107190">post on X</a>. The hackers are giving Axis until Oct. 17 to pay the ransom before selling the data. <a href="https://www.beckershospitalreview.com/cybersecurity/hackers-demand-1-5m-for-patient-data-after-colorado-system-breach.html">Full Story</a></p>
https://x.com/H4ckManac/status/1844453256120107190
cybersecurityventures:670a5637f6e8d8031735b18aSat, 12 Oct 2024 00:00:00 GMTThe Australian government has introduced new cybersecurity laws<p>Source: The Conversation</p><br><p>The Albanese government Oct. 9 introduced long-awaited legislation to parliament which is set to revolutionize Australia’s cybersecurity preparedness. The legislation, if passed, will be Australia’s first standalone cybersecurity act. It’s aimed at protecting businesses and consumers from the rising tide of cybercrime. Under the new law, victims of ransomware attacks who make payments must report the payment to authorities. This will help the government track cybercriminal activities and understand how much money is being lost to ransomware. The legislation will also introduce new minimum cybersecurity standards for all smart devices, such as watches, televisions, speakers and doorbells. <a href="https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889">Full Story</a></p>
https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889
cybersecurityventures:67065e42294da002f15c4f4bWed, 09 Oct 2024 00:00:00 GMTU.S. agency warns against Trinity ransomware targeting health sector<p>Source: Cointelegraph</p><br><p>A U.S. government agency warned about Trinity ransomware, known for extorting crypto from its victims in exchange for not leaking data accessed via several attack vectors. On Oct. 4, the US Health Sector Cybersecurity Coordination Center (HC3) <a href="https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf">published</a> a profile of Trinity ransomware, a threat actor that targets sensitive data. The attackers use phishing emails, malicious websites and software vulnerabilities to trick victims into installing the ransomware on their computers. It then searches the computer for sensitive information, collects it, and sends it to hackers. The ransomware also encrypts the victim’s files with an algorithm, rendering them useless. <a href="https://cointelegraph.com/news/us-agency-warns-trinity-ransomware-targeting-institutions">Full Story</a></p>
https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf
cybersecurityventures:67066347ea040d029397281bWed, 09 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/cryptocrime - Success ✔️
```rss
Cryptocrime - Cybercrime Magazine
https://cybersecurityventures.com//cryptocrime
Cryptocrime - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:35 GMT5U.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTHacker who stole and laundered billions in bitcoin with wife’s help gets 5-year sentence<p>Source: Reuters</p><br><p>A New York technology entrepreneur was sentenced to five years in prison on Thursday after pleading guilty last year to laundering funds stolen from Bitfinex, one of the world’s largest cryptocurrency exchanges, with the help of his wife. Ilya Lichtenstein, 35, hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques, and stole about 120,000 bitcoin, the Justice Department said in a statement. He and his wife Heather Morgan, who used the hip-hop alias “Razzklekhan” to promote her music, were arrested in Feb. 2022. <a href="https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/">Full Story</a></p>
https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/
cybersecurityventures:6737200286c94702d3fd0b32Fri, 15 Nov 2024 00:00:00 GMTChinese national faces 20 years in US prison for laundering pig-butchering proceeds<p>Source: The Record</p><br><p>One of the ringleaders of a <a href="https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams">scheme to launder millions stolen through cryptocurrency investment scams</a> pleaded guilty in a California courtroom Nov. 12. Daren Li, 41, faces up to 20 years in prison for taking part in an operation that laundered more than $73 million stolen from people duped by so-called “pig-butchering” scams. Pig butchering typically involves a scammer forming a relationship with a victim on messaging platforms before persuading them to make fraudulent investments. Li is a dual citizen of China and St. Kitts and Nevis, as well as a resident of both Cambodia and the United Arab Emirates. He pleaded guilty to one count of conspiracy to commit money laundering. <a href="https://therecord.media/chinese-national-faces-20-years-money-laundering-pig-butchering">Full Story</a></p>
https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams
cybersecurityventures:6735db37be012e029d73a1e6Thu, 14 Nov 2024 00:00:00 GMTChinese official ruined by crypto investments gets life in prison for selling state secrets<p>Source: The Record</p><br><p>Chinese authorities announced Nov. 8 that a public servant who found himself with large debts due to failed cryptocurrency investments had been sentenced to life in prison for selling state secrets to an unidentified foreign intelligence agency. According to a <a href="https://baijiahao.baidu.com/s?id=1815140973005200476">post on Baidu</a> by the Ministry of State Security (MSS) — the Chinese Communist Party’s secret police and intelligence agency — the official, pseudonymised as Wang Moumou, was recruited after posting online about his financial difficulties. According to the MSS, Wang provided “top-secret and confidential national information to foreign parties,” for which he received “over 1 million yuan ($138,000) in espionage funds through methods such as virtual currency recharge and trading.” <a href="https://therecord.media/chinese-official-ruined-by-crypto-investments-sold-state-secrets">Full Story</a></p>
https://baijiahao.baidu.com/s?id=1815140973005200476
cybersecurityventures:67348d60ab35b002d0d25358Wed, 13 Nov 2024 00:00:00 GMTFounder of Cryptocurrency Financial Services Firm "Gotbit" Indicted for Market Manipulation and Fraud Conspiracy<p>Source: U.S. Department of Justice</p><br><p>A Russian national residing in Portugal has been indicted for his role in a wide-ranging conspiracy to manipulate cryptocurrency markets on behalf of client cryptocurrency companies. Aleksei Andriunin, 26, was charged with wire fraud and conspiracy to commit market manipulation and wire fraud in a superseding indictment. According to court documents, Andriunin was Gotbit’s Founder and CEO. Gotbit was a well-known “market maker” in the cryptocurrency industry. It is alleged that between 2018 and 2024, Gotbit provided market manipulation services to create artificial trading volume for multiple cryptocurrency companies, including companies located in the U.S. <a href="https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and">News Release</a></p>
https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and
cybersecurityventures:67349837608f8f02e9318900Wed, 13 Nov 2024 00:00:00 GMTFTX sues Binance for $1.76B in battle of crypto exchanges founded by convicts<p>Source: ars TECHNICA</p><br><p>The bankruptcy estate of collapsed cryptocurrency exchange FTX has sued the company's former rival Binance. The lawsuit seeks "at least $1.76 billion that was fraudulently transferred to Binance and its executives at the FTX creditors' expense, as well as compensatory and punitive damages to be determined at trial." The complaint filed yesterday in U.S. Bankruptcy Court in Delaware names Binance and co-founder and former CEO Changpeng Zhao among the defendants. FTX founder Sam Bankman-Fried sold 20 percent of his crypto exchange to Binance in Nov. 2019, but Binance exited that investment in 2021, the lawsuit said. <a href="https://arstechnica.com/tech-policy/2024/11/ftx-sues-binance-for-1-76b-in-battle-of-crypto-exchanges-founded-by-convicts/">Full Story</a></p>
https://arstechnica.com/tech-policy/2024/11/ftx-sues-binance-for-1-76b-in-battle-of-crypto-exchanges-founded-by-convicts/
cybersecurityventures:67333954b788c00303c5d9ffTue, 12 Nov 2024 00:00:00 GMTDark web crypto laundering kingpin sentenced to 12.5 years in prison<p>Source: The Register</p><br><p>The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in U.S. prison. Roman Sterlingov, 36, a Russian-Swedish national, was also ordered to repay more than half a billion dollars accrued from the cryptocurrency mixing service that he ran for a decade between 2011 and 2021. Bitcoin Fog was assessed to have processed 1.2 million Bitcoin during that time, worth roughly $400 million at the time it was shuttered. Of this, Sterlingov was ordered to repay $395,563,025.39 in restitution, forfeit roughly $1.76 million in seized assets, and relinquish control of Bitcoin Fog's wallet containing more than $100 million in Bitcoin. <a href="https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/">Full Story</a></p>
https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/
cybersecurityventures:67333b4b7dcab60324ca09f7Tue, 12 Nov 2024 00:00:00 GMTApple phones might be harder for police to unlock, thanks to new reboot feature<p>Source: TechCrunch</p><br><p>New code introduced in the latest version of Apple’s mobile operating system could make it more difficult for both police and thieves to unlock iPhones. <a href="https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out/">404 Media reports</a> that law enforcement officials were warning each other that phones being stored for forensic examination seemed to be rebooting themselves — something that security experts confirmed in a <a href="https://www.404media.co/apple-quietly-introduced-iphone-reboot-code-which-is-locking-out-cops/">follow-up story</a>. After the reboot, it’s harder for those phones to be unlocked by password-cracking tools. Matthew Green, a cryptographer and assistant professor at Johns Hopkins University, described this as “a huge improvement in terms of security” that “probably doesn’t inconvenience anyone” — though the police might disagree. <a href="https://techcrunch.com/2024/11/09/iphones-might-be-harder-for-police-to-unlock-thanks-to-new-reboot-feature/">Full Story</a></p>
https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out/
cybersecurityventures:6731e9247dcab60324b58cfbMon, 11 Nov 2024 00:00:00 GMTNorth Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS<p>Source: The Hacker News</p><br><p>A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne dubbed the campaign <a href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">Hidden Risk</a>. The activity "uses emails propagating fake news about cryptocurrency trends to infect targets via a malicious application disguised as a PDF file," researchers said in a report shared with The Hacker News. As revealed by the FBI in a September <a href="https://www.ic3.gov/PSA/2024/PSA240903">advisory</a>, these campaigns are part of "highly tailored, difficult-to-detect social engineering" attacks aimed at employees working in the decentralized finance (DeFi) and cryptocurrency sectors. <a href="https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html">Full Story</a></p>
https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/
cybersecurityventures:672df83b0d771402e4a39d5bFri, 08 Nov 2024 00:00:00 GMTM2 crypto exchange hacked for $13M, user funds already restored<p>Source: Cointelegraph</p><br><p>Centralized cryptocurrency exchange (CEX) M2 was hacked for $13.7 million worth of digital assets, the exchange shared in an Oct. 31 announcement, which stated: “We would like to report that the situation has been fully resolved and customer funds have been restored. M2 has taken full responsibility for any potential losses, demonstrating our unwavering commitment to safeguarding our customers’ interests. All services are now fully operational with additional controls in place.” Hackers managed to steal the $13.7 million in Bitcoin from the exchange’s hot wallets, wrote pseudonymous onchain investigator ZachXBT in a Nov. 1 Telegram post. <a href="https://cointelegraph.com/news/m2-crypto-exchange-hacked-13-m-funds-restored">Full Story</a></p>
https://cointelegraph.com/news/m2-crypto-exchange-hacked-13-m-funds-restored
cybersecurityventures:6728baa04829960303351f37Mon, 04 Nov 2024 00:00:00 GMTTruth Terminal founder’s X account hacked, $600K stolen<p>Source: Cointelegraph</p><br><p>The developer behind the AI-powered X account Truth Terminal, an AI chatbot that merges artificial intelligence with memecoin culture and cryptocurrency dynamics, appears to have been hacked to shill a spurious memecoin, with the attackers clearing over $600,000 from the endeavor. On Oct. 29, Ayrey’s X account made a cryptic post announcing the launch of the new Infinite Backrooms (IB) token, with a picture that included the contract address for the memecoin — which sent the token rallying quickly to a $25 million valuation. However, the wallet responsible for deploying the token purchased 124.6 million IB for $38,400 at launch and sold the entirety of its holdings within 45 minutes for a total profit of $602,500, according to <a href="https://dexscreener.com/solana/gcdd3jlws37mevuvws8vawbgn2rzeefrrok23jy7g5x6">data</a> from Descreener. <a href="https://cointelegraph.com/news/truth-terminal-founder-x-account-hacked-promotes-scam-memecoin">Full Story</a>
</p>
https://dexscreener.com/solana/gcdd3jlws37mevuvws8vawbgn2rzeefrrok23jy7g5x6
cybersecurityventures:6720c1bdda415d02f7f2ed84Tue, 29 Oct 2024 00:00:00 GMTUS government-linked address likely exploited for over $20 million in crypto<p>Source: CryptoSlate</p><br><p>A hacker may have stolen over $20 million worth of crypto, including stablecoins and Ethereum (ETH), from a U.S. government-controlled wallet connected to the infamous 2016 Bitfinex hack. The suspicious transfers occurred Oct. 24, raising alarms among blockchain analysts. Arkham Intelligence first flagged the transfers from the wallet, which had been dormant for eight months before it suddenly moved $1.25 million in Tether (USDT) and $5.5 million in USD Coin (USDC) from the DeFi platform Aave. Additionally, around $13.7 million in aUSDC — an interest-bearing token representing USDC deposited in Aave — along with $446,000 worth of Ethereum, was sent to a recently created wallet. Update: The stolen funds were <a href="https://cryptoslate.com/hacker-returns-stolen-funds-to-us-government-in-less-than-24-hours/">returned</a> within 24 hours. <a href="https://cryptoslate.com/us-government-linked-address-likely-exploited-for-over-20-million-in-crypto/">Full Story</a>
</p>
https://cryptoslate.com/hacker-returns-stolen-funds-to-us-government-in-less-than-24-hours/
cybersecurityventures:671b804ac7add6028b4fdd00Fri, 25 Oct 2024 00:00:00 GMT93K People Impacted By Transak Data Breach<p>Source: CoinDesk</p><br><p>A crypto industry employee's use of a laptop for non-work purposes is reportedly at the heart of a data breach involving some 93,000 unique users – and now a ransomware group is attempting to negotiate with the company that was targeted. Transak, an "onramp" used by a number of popular blockchain companies to allow customers to buy cryptocurrencies, disclosed in a <a href="https://transak.com/blog/transak-security-incident-oct-2024">blog post</a> on Oct. 21 that it had fallen victim to a data breach. According to Transak, the leaked data was limited to "names" and "basic identity information." In an interview with CoinDesk, Transak CEO Sami Start said that 93,000 people were impacted by the breach, which included passports, ID cards and selfies used by customers to verify their identities with crypto financial products. <a href="https://www.coindesk.com/tech/2024/10/21/crypto-on-ramp-service-transak-targeted-in-data-breach/">Full Story</a></p>
https://transak.com/blog/transak-security-incident-oct-2024
cybersecurityventures:67178b91c8cf6d030138f4c1Tue, 22 Oct 2024 00:00:00 GMTRadiant Capital Loses $50M to Second Blockchain Exploit This Year<p>Source: CoinDesk</p><br><p>Blockchain lending protocol Radiant Capital lost more than $50 million on Oct. 16 as the result of an apparent cyberattack, according to security experts and blockchain data. An attacker gained control of Radiant Capital's blockchain contracts by obtaining three of the "private keys" that control the protocol, security experts said. The Radiant platform encompasses a suite of tools allowing users to borrow, lend, and bridge cryptocurrencies across blockchains. It's the second time this year that the protocol has been targeted in an exploit: In January, Radiant lost $4.5 million in an unrelated hack stemming from a bug in its smart contracts. <a href="https://www.coindesk.com/tech/2024/10/16/radiant-capital-loses-50m-to-blockchain-exploit/">Full Story</a></p>
https://www.coindesk.com/tech/2024/10/16/radiant-capital-loses-50m-to-blockchain-exploit/
cybersecurityventures:671241b76c90960306b088f2Fri, 18 Oct 2024 00:00:00 GMTHow the FBI used a fake AI fund coin to nab fraudsters<p>Source: Cointelegraph</p><br><p>The FBI used a fake artificial intelligence fund crypto to catch alleged fraudsters engaged in market manipulation. According to an Oct. 7 indictment in Massachusetts Federal District Court, the coin, which the agency called “NexFundAI (NEXF),” was presented as a crypto security that claimed to represent shares in an AI-related fund. The FBI <a href="https://www.justice.gov/d9/2024-10/zhou_information_0.pdf">told</a> scammers that it wanted help manipulating the token’s trading volume. This would fool investors into believing that the coin was more popular than it actually was. The scammers offered to help with the fraud, and the agency used the evidence collected during this process to get an indictment against them. <a href="https://cointelegraph.com/news/fbi-token-fake-ai-fund-coin-fraud">Full Story</a></p>
https://www.justice.gov/d9/2024-10/zhou_information_0.pdf
cybersecurityventures:670cff87ddfa8c02d2768d0bMon, 14 Oct 2024 00:00:00 GMTUkrainian National Pleads Guilty to “Raccoon Infostealer” Cybercrime<p>Source: U.S. Department of Justice</p><br><p>A Ukrainian national pleaded guilty in federal court Oct. 7 to one count of conspiracy to commit computer intrusion. Mark Sokolovsky, 28, conspired to operate the Raccoon Infostealer as a malware-as-a-service or “MaaS.” Individuals who deployed Raccoon Infostealer to steal data from victims leased access to the malware for approximately $200 per month, paid for by cryptocurrency. These individuals used various ruses, such as email phishing, to install the malware onto the computers of unsuspecting victims. Raccoon Infostealer then stole personal data from victim computers, including log-in credentials, financial information, and other personal records. As part of the plea, Sokolovsky agreed to restitution of nearly $1 million USD. <a href="https://www.justice.gov/usao-wdtx/pr/ukrainian-national-pleads-guilty-raccoon-infostealer-cybercrime">News Release</a></p>
https://www.justice.gov/usao-wdtx/pr/ukrainian-national-pleads-guilty-raccoon-infostealer-cybercrime
cybersecurityventures:670661d0179f84031987b290Wed, 09 Oct 2024 00:00:00 GMTU.S. agency warns against Trinity ransomware targeting health sector<p>Source: Cointelegraph</p><br><p>A U.S. government agency warned about Trinity ransomware, known for extorting crypto from its victims in exchange for not leaking data accessed via several attack vectors. On Oct. 4, the US Health Sector Cybersecurity Coordination Center (HC3) <a href="https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf">published</a> a profile of Trinity ransomware, a threat actor that targets sensitive data. The attackers use phishing emails, malicious websites and software vulnerabilities to trick victims into installing the ransomware on their computers. It then searches the computer for sensitive information, collects it, and sends it to hackers. The ransomware also encrypts the victim’s files with an algorithm, rendering them useless. <a href="https://cointelegraph.com/news/us-agency-warns-trinity-ransomware-targeting-institutions">Full Story</a></p>
https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf
cybersecurityventures:67066347ea040d029397281bWed, 09 Oct 2024 00:00:00 GMTSoutheast Asia cyber scammers stole $37B in 2023 as AI-driven crimes soar: UN report<p>Source: New York Post</p><br><p>Southeast Asia has become a hotbed for cyber crime syndicates who have swiped as much as $37 billion last year through romance-investment schemes, crypto fraud, money laundering and illegal gambling, according to a new United Nations <a href="https://www.unodc.org/roseap/uploads/documents/Publications/2024/TOC_Convergence_Report_2024.pdf">report</a>. Cyber criminals in countries like Myanmar, Cambodia and Laos are using malware, generative artificial intelligence and deepfakes at greater rates to carry out the scams, the report by the UN’s Office on Drugs and Crime found. “The <a href="https://fortune.com/asia/2024/10/07/southeast-asia-scammers-stole-up-to-37-billion-un/">transnational organized crime threat landscape in Southeast Asia</a> is evolving faster than in any previous point in history,” according to the report, first cited by Fortune. <a href="https://nypost.com/2024/10/07/business/southeast-asia-scammers-stole-up-to-37b-last-year-report/">Full Story</a></p>
https://www.unodc.org/roseap/uploads/documents/Publications/2024/TOC_Convergence_Report_2024.pdf
cybersecurityventures:6704fe25880ad902e676a86fTue, 08 Oct 2024 00:00:00 GMTLego's website was hacked to promote a crypto scam<p>Source: Engadget</p><br><p>People who visited Lego's website on the evening of Oct. 4 were welcomed by a banner with illustrated golden coins bearing the company's logo, claiming that the "Lego coin" is now officially out. It even promised "secret rewards" to those who'd buy some. But Lego wasn't truly launching an official cryptocurrency coin, and <a href="https://www.thebrickfan.com/lego-shop-hacked-by-crypto-scam/">according to The Brick Fan</a>, the button to buy led to an external cryptocurrency website selling "LEGO Tokens" with Ethereum. The website was, seemingly, hijacked by bad actors who switched its banner and used it for some sort of crypto scam. Billund, Denmark-based Lego is one of the world’s largest manufacturers of toys. <a href="https://www.engadget.com/cybersecurity/legos-website-was-hacked-to-promote-a-crypto-scam-140045757.html">Full Story</a>
</p>
https://www.thebrickfan.com/lego-shop-hacked-by-crypto-scam/
cybersecurityventures:6703b8a7c3639b02f239f404Mon, 07 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/hack-blotter - Success ✔️
```rss
Hack Blotter - Cybercrime Magazine
https://cybersecurityventures.com//hack-blotter
Hack Blotter - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:35 GMT5U.S. Accuses Five in ‘Scattered Spider’ Hacking Spree<p>Source: Bloomberg</p><br><p>Five alleged members of the notorious Scattered Spider gang were accused by U.S. prosecutors of a hacking spree that targeted dozens of companies and individuals, resulting in the theft of sensitive data and at least $11 million in cryptocurrency, according to a complaint and indictment unsealed Nov. 20. The defendants relied on a variety of fraudulent techniques, including text phishing and SIM swapping, to obtain legitimate credentials from employees so they could gain unauthorized access to their accounts and company networks between late 2021 and the spring of 2023, according to federal prosecutors in California. They used that access to steal confidential data and to identify and gain access to individuals’ virtual currency accounts and wallets, the U.S. said. <a href="https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree">Full Story</a></p>
https://www.bloomberg.com/news/articles/2024-11-20/us-accuses-five-in-scattered-spider-cybercrime-spree
cybersecurityventures:673f173a053a3402f1dd2af4Thu, 21 Nov 2024 00:00:00 GMTRussian Man Extradited to US, Face Charges in Phobos Ransomware Operation<p>Source: HackRead</p><br><p>The U.S. Department of Justice has charged Evgenii Ptitsyn (using online aliases “derxan” and “zimmermanx,”) a 42-year-old Russian national, for his alleged role in the sale, distribution, and operation of Phobos ransomware. Ptitsyn appeared in the U.S. District Court for the District of Maryland on Nov. 4, following his extradition from South Korea. Phobos ransomware, allegedly managed by Ptitsyn and his associates, targeted over 1,000 public and private entities worldwide, including large corporations, governments, schools, hospitals, and nonprofits. The ransomware operation extorted more than $16 million in ransom payments from its victims. <a href="https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/">Full Story</a></p>
https://hackread.com/russian-hacker-extradite-us-phobos-ransomware-charges/
cybersecurityventures:673dcb3e091a3502bfbce70dWed, 20 Nov 2024 00:00:00 GMTFounder of Crypto ‘Mixer’ Helix Sentenced to Three Years<p>Source: The Wall Street Journal</p><br><p>The operator of a cryptocurrency mixer that laundered customers’ bitcoin has been sentenced to three years in prison. Larry Dean Harmon, who ran the cryptocurrency mixer Helix and a darknet search engine called Grams, was sentenced Friday in federal court in Washington, D.C., according to prosecutors. Harmon was also ordered to serve three years of supervised release and to forfeit cryptocurrency, real estate and other assets worth more than $400 million. Prosecutors had recommended a 75-month sentence. Mixers such as Helix combine bitcoin from multiple sources and redistribute them to make it harder to trace transactions. <a href="https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10">Full Story</a></p>
https://www.wsj.com/articles/founder-of-crypto-mixer-helix-sentenced-to-three-years-25b4e2bb?mod=hp_minor_pos10
cybersecurityventures:673b1fd176d72c02c4955155Mon, 18 Nov 2024 00:00:00 GMTHacker who stole and laundered billions in bitcoin with wife’s help gets 5-year sentence<p>Source: Reuters</p><br><p>A New York technology entrepreneur was sentenced to five years in prison on Thursday after pleading guilty last year to laundering funds stolen from Bitfinex, one of the world’s largest cryptocurrency exchanges, with the help of his wife. Ilya Lichtenstein, 35, hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques, and stole about 120,000 bitcoin, the Justice Department said in a statement. He and his wife Heather Morgan, who used the hip-hop alias “Razzklekhan” to promote her music, were arrested in Feb. 2022. <a href="https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/">Full Story</a></p>
https://nypost.com/2024/11/14/business/ilya-lichtenstein-sentenced-to-5-years-for-bitfinex-bitcoin-hack/
cybersecurityventures:6737200286c94702d3fd0b32Fri, 15 Nov 2024 00:00:00 GMTTwo hackers allegedly filed more than 1,000 fraudulent U.S. tax returns<p>Source: Internal Revenue Service</p><br><p>The U.S. government unsealed charges Nov. 13 against two individuals for their scheme to allegedly intrude Massachusetts tax preparation firms’ computer networks to steal confidential client information and then file fraudulent tax returns seeking tax refunds to be deposited in bank accounts they controlled. From 2016 to 2021, Matthew A. Akande of Mexico and Nigeria and Kehinde H. Oyetunji of North Dakota and Nigeria, allegedly worked together to steal money from the U.S. government using taxpayers’ personally identifiable information to file more than 1,000 fraudulent tax returns seeking over $8.1 million in fraudulent tax refunds, and to have successfully obtained over $1.3 million in fraudulent tax refunds. <a href="https://www.irs.gov/compliance/criminal-investigation/computer-intrusion-and-theft-charges-unsealed-against-two-men">News Release</a></p>
https://www.irs.gov/compliance/criminal-investigation/computer-intrusion-and-theft-charges-unsealed-against-two-men
cybersecurityventures:67372a5af73d45030958631aFri, 15 Nov 2024 00:00:00 GMTSouth Korea police arrest 215 in suspected $228M crypto scam<p>Source: Reuters</p><br><p>South Korean police have arrested 215 people on suspicion of stealing 320 billion won ($228.4 million) in the biggest cryptocurrency investment scam in the country. Gyeonggi Nambu Provincial Police said on Nov. 13 the arrests included the alleged mastermind of the organized crime group accused of selling 28 types of virtual tokens to about 15,000 people by promising high returns. Police said the group had issued six of the 28 tokens on overseas crypto exchanges and were managing a team of market makers to push up prices. Police described the tokens as "worthless". Of the 215 people arrested, <a href="https://cointelegraph.com/news/south-korea-influencer-crypto-scam-215-arrests">12 remain in custody</a>, South Korean news agency Yonhap reported. <a href="https://www.reuters.com/technology/south-korea-police-arrest-215-suspected-228-mln-crypto-scam-2024-11-13/">Full Story</a></p>
https://cointelegraph.com/news/south-korea-influencer-crypto-scam-215-arrests
cybersecurityventures:6735d10ca5d99902c8cf35daThu, 14 Nov 2024 00:00:00 GMTHacker broke into metro Atlanta computer servers, extortion plot sentenced to 10 years in prison<p>Source: WSB-TV 2 Atlanta</p><br><p>An Idaho man who hacked into the servers belonging to the City of Newnan, Ga. has been sentenced to federal prison after stealing the personal information of 132,000 people, Department of Justice officials say. Robert Purbeck, 45 “purchased access to the computer server of a Griffin, Ga. medical clinic on a darknet marketplace in Feb. 2018.” Officials say he then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers. He then attempted to extort a Florida orthodontist for Bitcoin in return for his stolen patient files. <a href="https://www.yahoo.com/news/hacker-broke-metro-atlanta-computer-224226666.html">Full Story</a>
</p>
https://www.yahoo.com/news/hacker-broke-metro-atlanta-computer-224226666.html
cybersecurityventures:6735d409c7c0fc02b1899ab6Thu, 14 Nov 2024 00:00:00 GMTChinese national faces 20 years in US prison for laundering pig-butchering proceeds<p>Source: The Record</p><br><p>One of the ringleaders of a <a href="https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams">scheme to launder millions stolen through cryptocurrency investment scams</a> pleaded guilty in a California courtroom Nov. 12. Daren Li, 41, faces up to 20 years in prison for taking part in an operation that laundered more than $73 million stolen from people duped by so-called “pig-butchering” scams. Pig butchering typically involves a scammer forming a relationship with a victim on messaging platforms before persuading them to make fraudulent investments. Li is a dual citizen of China and St. Kitts and Nevis, as well as a resident of both Cambodia and the United Arab Emirates. He pleaded guilty to one count of conspiracy to commit money laundering. <a href="https://therecord.media/chinese-national-faces-20-years-money-laundering-pig-butchering">Full Story</a></p>
https://www.justice.gov/opa/pr/foreign-national-pleads-guilty-laundering-millions-proceeds-cryptocurrency-investment-scams
cybersecurityventures:6735db37be012e029d73a1e6Thu, 14 Nov 2024 00:00:00 GMTChinese official ruined by crypto investments gets life in prison for selling state secrets<p>Source: The Record</p><br><p>Chinese authorities announced Nov. 8 that a public servant who found himself with large debts due to failed cryptocurrency investments had been sentenced to life in prison for selling state secrets to an unidentified foreign intelligence agency. According to a <a href="https://baijiahao.baidu.com/s?id=1815140973005200476">post on Baidu</a> by the Ministry of State Security (MSS) — the Chinese Communist Party’s secret police and intelligence agency — the official, pseudonymised as Wang Moumou, was recruited after posting online about his financial difficulties. According to the MSS, Wang provided “top-secret and confidential national information to foreign parties,” for which he received “over 1 million yuan ($138,000) in espionage funds through methods such as virtual currency recharge and trading.” <a href="https://therecord.media/chinese-official-ruined-by-crypto-investments-sold-state-secrets">Full Story</a></p>
https://baijiahao.baidu.com/s?id=1815140973005200476
cybersecurityventures:67348d60ab35b002d0d25358Wed, 13 Nov 2024 00:00:00 GMTDiscord leaker Jack Teixeira gets 15-year sentence for sharing classified documents<p>Source: Engadget</p><br><p>Massachusetts Air National Guard member Jack Teixeira received a 15-year sentence in federal prison for leaking classified military documents on Discord in a Boston federal court, <a href="https://www.washingtonpost.com/national-security/2024/11/12/jack-teixeira-sentence-discord-leak/?location=alert">according to The Washington Post</a>. Teixeira shared classified military documents as far back as late 2022 on a Discord server dedicated to the pixelated sandbox game Minecraft. The leak included information about the Ukrainian and Russian troop movements and military equipment used in the war in Ukraine and Russia's attempts to obtain more weapons from Egypt and Turkey. The documents eventually found their way to other Discord servers as well as 4chan and Telegram. <a href="https://www.engadget.com/cybersecurity/discord-leaker-jack-teixeira-gets-15-year-sentence-for-sharing-classified-documents-231319586.html">Full Story</a></p>
https://www.washingtonpost.com/national-security/2024/11/12/jack-teixeira-sentence-discord-leak/?location=alert
cybersecurityventures:6734907bae45b202f77709feWed, 13 Nov 2024 00:00:00 GMTFounder of Cryptocurrency Financial Services Firm "Gotbit" Indicted for Market Manipulation and Fraud Conspiracy<p>Source: U.S. Department of Justice</p><br><p>A Russian national residing in Portugal has been indicted for his role in a wide-ranging conspiracy to manipulate cryptocurrency markets on behalf of client cryptocurrency companies. Aleksei Andriunin, 26, was charged with wire fraud and conspiracy to commit market manipulation and wire fraud in a superseding indictment. According to court documents, Andriunin was Gotbit’s Founder and CEO. Gotbit was a well-known “market maker” in the cryptocurrency industry. It is alleged that between 2018 and 2024, Gotbit provided market manipulation services to create artificial trading volume for multiple cryptocurrency companies, including companies located in the U.S. <a href="https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and">News Release</a></p>
https://www.justice.gov/usao-ma/pr/founder-cryptocurrency-financial-services-firm-gotbit-indicted-market-manipulation-and
cybersecurityventures:67349837608f8f02e9318900Wed, 13 Nov 2024 00:00:00 GMTDark web crypto laundering kingpin sentenced to 12.5 years in prison<p>Source: The Register</p><br><p>The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in U.S. prison. Roman Sterlingov, 36, a Russian-Swedish national, was also ordered to repay more than half a billion dollars accrued from the cryptocurrency mixing service that he ran for a decade between 2011 and 2021. Bitcoin Fog was assessed to have processed 1.2 million Bitcoin during that time, worth roughly $400 million at the time it was shuttered. Of this, Sterlingov was ordered to repay $395,563,025.39 in restitution, forfeit roughly $1.76 million in seized assets, and relinquish control of Bitcoin Fog's wallet containing more than $100 million in Bitcoin. <a href="https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/">Full Story</a></p>
https://www.theregister.com/2024/11/11/bitcoin_fog_sentencing/
cybersecurityventures:67333b4b7dcab60324ca09f7Tue, 12 Nov 2024 00:00:00 GMTSouth Dakota ATM Hackers Stole $100K, Arrested<p>Source: 99.1 KXLG</p><br><p>A 25-year-old man, Henry Theis, was arrested Nov. 9 by West Fargo, S.D. police while parked outside a Gate City Bank branch. Theis, believed to be part of a group of people from Venezuela, was involved in a series of thefts targeting ATMs. Police stopped Theis for driving without his headlights on and found a latex glove, a facemask, a computer keyboard, cables, and a bag containing nearly $25,000 in cash during a search of his car. Court documents reveal that Theis admitted to being part of an organization of hackers who were "jackpotting" ATMs, using a virus to steal money. Two other suspects were arrested in a traffic stop on I-29 near Watertown, bringing the total theft amount to almost $100,000. <a href="https://www.mykxlg.com/news/local/west-fargo-police-arrest-suspected-atm-hacker-linked-to-venezuelan-group-two-found-in-watertown/article_2564b01a-9d77-11ef-acda-c74bdbfbff0d.html">Full Story</a></p>
https://www.mykxlg.com/news/local/west-fargo-police-arrest-suspected-atm-hacker-linked-to-venezuelan-group-two-found-in-watertown/article_2564b01a-9d77-11ef-acda-c74bdbfbff0d.html
cybersecurityventures:6731df34066dce029762cf2bMon, 11 Nov 2024 00:00:00 GMTNigerian national gets 10-year sentence for stealing $20 million through business email compromise scams<p>Source: The Record</p><br><p>A Nigerian national was sentenced to 10 years in U.S. federal prison for stealing almost $20 million from hundreds of people through cyber fraud. Babatunde Francis Ayeni, a 33-year-old who had been living in the U.K, was convicted for his role in a business email compromise scheme that targeted real estate transactions. Ayeni pleaded guilty to wire fraud charges in April and was sentenced this week. Ayeni worked with two other people in Nigeria and the United Arab Emirates — co-defendants Feyisayo Ogunsanwo and Yusuf Lasisi — who allegedly sent phishing emails with malicious links and attachments to title companies, real estate agents, and real estate attorneys across the U.S. <a href="https://therecord.media/nigeria-national-twenty-million-scams">Full Story</a></p>
https://therecord.media/nigeria-national-twenty-million-scams
cybersecurityventures:6731e2ca8ff87203013d98deMon, 11 Nov 2024 00:00:00 GMTDiscord terrorist known as “Rabid” gets 30 years for preying on kids<p>Source: ars TECHNICA</p><br><p>A Michigan man who ran chat rooms and Discord servers targeting children playing online games and coercing them into self-harm, sexually explicit acts, suicide, and other violence was sentenced to 30 years in prison Nov. 7. <a href="https://www.justice.gov/opa/pr/member-violent-764-terror-network-sentenced-30-years-prison-sexually-exploiting-child">According to the U.S. Department of Justice</a>, Richard Densmore was a member of an online terrorist network called 764, which the FBI considers a "tier one" terrorist threat. He pled guilty to sexual exploitation of a child as "part of a broader indictment that charged him with other child exploitation offenses." In the DOJ's press release, FBI Director Christopher Wray committed to bring to justice any abusive groups known to be preying on vulnerable kids online. <a href="https://arstechnica.com/tech-policy/2024/11/discord-terrorist-known-as-rabid-gets-30-years-for-preying-on-kids/">Full Story</a></p>
https://www.justice.gov/opa/pr/member-violent-764-terror-network-sentenced-30-years-prison-sexually-exploiting-child
cybersecurityventures:6731e4866fc1ff02f3457b3eMon, 11 Nov 2024 00:00:00 GMTMinnesota Man Sentenced to Five Years in Prison for $2.3M Romance Fraud Scheme<p>Source: U.S. Attorney's Office, District of Minnesota</p><br><p>A Brooklyn Park, Minn. man has been sentenced to 63 months in prison, three years of supervised release, and was ordered to pay full restitution in the amount of $2,144,291.86 for facilitating a national romance fraud scheme. According to court documents, beginning in May 2018 through Jun. 2022, Dodzi Kwame Kordorwu, 38, helped facilitate an online romance fraud scheme that targeted primarily elderly victims and lured them into sending money under false pretenses. The scheme relied on perpetrators impersonating a real or plausible but fictitious person, such as a senior U.S. diplomat or military official, that contacted the victims through online social media applications. <a href="https://cybersecurityventures.com//Brooklyn%20Park%20Man%20Sentenced%20to%20Five%20Years%20in%20Prison%20for%20$2.3M%20Romance%20Fraud%20Scheme">News Release</a></p>
https://cybersecurityventures.com//Brooklyn%20Park%20Man%20Sentenced%20to%20Five%20Years%20in%20Prison%20for%20$2.3M%20Romance%20Fraud%20Scheme
cybersecurityventures:672caacb36fb0503186cc4c3Thu, 07 Nov 2024 00:00:00 GMTNigeria Arrests 113 Foreigners in Cybercrime Sweep<p>Source: Organized Crime and Corruption Reporting Project (OCCRP)</p><br><p>Nigerian authorities have arrested 113 foreign nationals in connection with high-level hacking activities deemed a threat to national security, officials said Nov. 3. The arrests followed a coordinated raid on a building in the Jahi area of Abuja, according to Olumuyiwa Adejobi, Public Relations Officer of the Nigeria Police Force. Adejobi said the suspects were detained after an extensive operation targeting cybercrime networks. Authorities reported that the suspects used computers and advanced technology to carry out a range of cybercrimes, including hacking, identity theft, fraudulent email schemes, and other digital frauds. <a href="https://www.occrp.org/en/news/nigeria-arrests-113-foreigners-in-cybercrime-sweep">Full Story</a></p>
https://www.occrp.org/en/news/nigeria-arrests-113-foreigners-in-cybercrime-sweep
cybersecurityventures:672b508fa17ab302ac9aa211Wed, 06 Nov 2024 00:00:00 GMTINTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime<p>Source: The Hacker News</p><br><p>INTERPOL on Nov. 5 said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from Apr. 1 to Aug. 31, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 percent were taken down and 59 servers were seized," INTERPOL said. "Additionally, 43 electronic devices, including laptops, mobile phones and hard disks were seized." The actions also led to the arrest of 41 individuals, with 65 others still under investigation. <a href="https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html">Full Story</a></p>
https://thehackernews.com/2024/11/interpols-operation-synergia-ii.html
cybersecurityventures:672b592ca17ab302ac9b5927Wed, 06 Nov 2024 00:00:00 GMTCanada Arrests Man Suspected of Hacks of Snowflake Customers<p>Source: Bloomberg</p><br><p>Canadian authorities have arrested a man suspected of being behind a string of hacks involving as many as 165 customers of Snowflake Inc., according to people familiar with the matter. Some of the known victims that had their data stolen included AT&T, Live Nation (Ticketmaster’s parent company), and Advanced Auto Parts. Following a request from the U.S., Alexander “Connor” Moucka was taken into custody on a provisional arrest warrant on Oct. 30, according to Canada’s Department of Justice. He is due to appear in court Nov. 5. <a href="https://www.bloomberg.com/news/articles/2024-11-05/hacker-said-to-be-behind-breach-of-snowflake-customers-arrested?embedded-checkout=true">Full Story</a>
</p>
https://www.bloomberg.com/news/articles/2024-11-05/hacker-said-to-be-behind-breach-of-snowflake-customers-arrested?embedded-checkout=true
cybersecurityventures:672a094966237f02a33755edTue, 05 Nov 2024 00:00:00 GMTFired Disney staffer accused of hacking menu, removing allergen info<p>Source: The Register</p><br><p>An ex-Disney employee has been arrested and charged with hacking his former employer's systems. Michael Scheuer was charged [PDF] and arrested last week for allegedly breaking into his former employer's systems. Fired from his role as a menu production manager in June, a month later Scheuer accessed the menu creation system Disney contracted another company to create and he changed all the fonts in the system to wingdings symbols. According to the complaint, the changes knocked the system offline for a couple of weeks, requiring backup restoration to fix. Scheuer is also accused of having downloaded menus and altered them to eliminate allergen information, suggesting foods were safe when they weren't. <a href="https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/">Full Story</a></p>
https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/
cybersecurityventures:67235fe3dd7f9102cc9840f0Thu, 31 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/cybersecurity-venture-capital-vc-deals - Success ✔️
```rss
VC Deal Flow - Cybercrime Magazine
https://cybersecurityventures.com//cybersecurity-venture-capital-vc-deals
VC Deal Flow - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:37 GMT5Twine Raises $12M in Seed funding to deploy AI cyber workers<p>Source: CTech</p><br><p>Cybersecurity startup Twine, founded by former executives from Claroty, has raised $12 million in a Seed funding round co-led by Ten Eleven Ventures and Dell Technologies Capital. Notably, two of the co-founders of Wiz, Assaf Rappaport and Roy Reznik, also participated in the funding round, alongside other investors. The company operates from offices in Tel Aviv and Seattle, employing over 20 people across Israel and the U.S. Twine’s platform equips cybersecurity teams with digital employees who work alongside cyber teams to complete their security objectives. <a href="https://www.calcalistech.com/ctechnews/article/hy9k4eofkg">Full Story</a></p>
https://www.calcalistech.com/ctechnews/article/hy9k4eofkg
cybersecurityventures:673dd196091a3502bfbd7fd2Wed, 20 Nov 2024 00:00:00 GMTPrompt Security raises $18 million to help companies better secure generative AI tools<p>Source: Business Insider</p><br><p>Prompt Security is helping companies manage the cybersecurity risks associated with generative AI tools like OpenAI's ChatGPT or Google's Gemini. Founded in 2023, Prompt has raised $18 million in fresh funding, Business Insider has learned exclusively. The round was led by Jump Capital, with participation from Hetz Ventures, Ridge Ventures, and tech companies Okta and F5. The startup previously raised $6 million in seed funding. Prompt Security counts a number of Fortune 500 companies among its customer base. The company is finishing the year with $1 million in annual revenue. <a href="https://www.businessinsider.com/prompt-security-raise-18-million-secure-generative-ai-tools-2024-11">Full Story</a></p>
https://www.businessinsider.com/prompt-security-raise-18-million-secure-generative-ai-tools-2024-11
cybersecurityventures:673e204591a3f102c94e9d20Wed, 20 Nov 2024 00:00:00 GMTHopae Secures $6.5 Million for Digital Identification and Verification<p>Source: PRWeb</p><br><p>Hopae, makers of the world's most advanced digital identity solution, announced $6.5 million in funding as the company introduces its proprietary, patented Digital Credential eXpress (DCX) architecture to the U.S., simplifying the complex world of decentralized ID (DID) implementation. Hopae helps governments and institutions issue reusable, privacy-preserving, and unforgeable digital IDs and credentials. Its expansion and funding news comes as companies seek to comply with new international digital identity regulations. Hopae has offices in Seoul, Paris and is currently establishing its new headquarters in San Francisco. <a href="https://www.prweb.com/releases/hopae-secures-6-5-million-for-digital-identification-and-verification-making-processes-safer-and-easier-all-over-the-world-302311570.html">Press Release</a></p>
https://www.prweb.com/releases/hopae-secures-6-5-million-for-digital-identification-and-verification-making-processes-safer-and-easier-all-over-the-world-302311570.html
cybersecurityventures:673e2757189579031a74b839Wed, 20 Nov 2024 00:00:00 GMTRIIG Secures $3 Million to Help Protect Organizations from Cyber Threats<p>Source: PRWeb</p><br><p>RIIG, a risk intelligence and cybersecurity solutions provider, announced that it has closed a $3 million seed funding round. This capital will be used to accelerate the development and launch of RIIG's AI-powered solutions, expand client support, and grow its sales and marketing teams. Specializing in white hat data trust services, RIIG offers open-source intelligence solutions designed for Zero Trust environments. With access to 17 intel agencies and collaborations with commercial partners, RIIG empowers organizations with high-quality, verifiable data and advanced intelligence solutions that enable robust security and effective risk management. <a href="https://www.prweb.com/releases/riig-secures-3-million-to-help-protect-organizations-from-cyber-threats-with-advanced-data-intelligence-solutions-302306881.html">Press Release</a></p>
https://www.prweb.com/releases/riig-secures-3-million-to-help-protect-organizations-from-cyber-threats-with-advanced-data-intelligence-solutions-302306881.html
cybersecurityventures:673cbdb7256a2202f139218dTue, 19 Nov 2024 00:00:00 GMTSurePath AI Announces $5.2M Seed Funding to Secure GenAI Adoption in the Enterprise<p>Source: PR Newswire</p><br><p>SurePath AI, a leader in governing generative AI for the enterprise, announced the closure of a $5.2 million seed funding round led by Uncork Capital with significant participation from Operator Collective, bringing the company's total funding to $6.3 million. SurePath AI's mission is to enable secure GenAI adoption by detecting usage, mitigating risks, and controlling AI access to enterprise data so that organizations can bolster innovation and productivity. "As GenAI adoption continues to surge across industries, businesses are challenged to balance the risks and benefits," said Casey Bleeker, CEO and Founder of SurePath AI. <a href="https://www.prnewswire.com/news-releases/surepath-ai-announces-over-5-million-in-seed-funding-to-secure-genai-adoption-in-the-enterprise-302304040.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/surepath-ai-announces-over-5-million-in-seed-funding-to-secure-genai-adoption-in-the-enterprise-302304040.html
cybersecurityventures:673b33a5152f2d029df7ceefMon, 18 Nov 2024 00:00:00 GMTCyber Upgrade secures €2.5M Seed to automate cyber oversight<p>Source: Tech.eu</p><br><p>Cyber Upgrade, a Lithuania-based cybersecurity provider, has raised €2.5 million in a Seed funding round backed by Superhero Capital, Specialist VC, FIRSTPICK, NGL Ventures, and angel investors Marios S. Kalochoritis and Sergei Anikin, ex-CEO of PipeDrive. This investment is the company's second in 12 months, following a Pre-Seed round of €650,000 in Feb. 2024. The funding will be used to enhance its AI system, aiming for it to operate autonomously with no human oversight. <a href="https://tech.eu/2024/11/14/cyber-upgrade-secures-2-5m-seed-to-automate-cyber-oversight/">Full Story</a></p>
https://tech.eu/2024/11/14/cyber-upgrade-secures-2-5m-seed-to-automate-cyber-oversight/
cybersecurityventures:6735e263ba956f02a1237876Thu, 14 Nov 2024 00:00:00 GMTIsraeli cybersecurity company Upwind raises $100M<p>Source: GLOBES</p><br><p>Israeli cybersecurity company Upwind Security has nearly completed a $100 million Series B financing round at a company valuation $850-900 million, post money, TechCrunch reports. New and existing investors in the latest round include Craft Ventures, Greylock, CyberStarts, Leaders Fund, Omri Casspi’s Sheva Fund, and basketball star Steph Curry’s investment fund Penny Jar. TechCrunch says that the financing round could be closed this week. The company has 100 employees in its Tel Aviv development center and 50 employees in its San Francisco headquarters as well as offices in the UK and Iceland. <a href="https://en.globes.co.il/en/article-israeli-cybersecurity-co-upwind-raises-100m-report-1001493613">Full Story</a></p>
https://en.globes.co.il/en/article-israeli-cybersecurity-co-upwind-raises-100m-report-1001493613
cybersecurityventures:673340d2a6e10d02a40c49f6Tue, 12 Nov 2024 00:00:00 GMTEmbed Security Raises $6M in Funding<p>Source: FINSMES</p><br><p>Embed Security, a Reno, Texas-based provider of an agentic security platform, raised $6M in funding. The round was led by Paladin Capital Group with participation from industry executive angel investors. The company intends to use the funds to accelerate R&D, expand customer engagements, and build out a team to continue solving critical cyber security challenges. Its technology is currently being tested with early-access customers in the automotive, insurance, legal, and technology sectors. Embed Security was founded in 2024. <a href="https://www.finsmes.com/2024/11/embed-security-raises-6m-in-funding.html">Full Story</a></p>
https://www.finsmes.com/2024/11/embed-security-raises-6m-in-funding.html
cybersecurityventures:672df9510d771402e4a3a7e0Fri, 08 Nov 2024 00:00:00 GMTUK's CloudGuard secures multi-million-pound backing<p>Source: BusinessCloud</p><br><p>A Manchester, U.K.-based cybersecurity startup has become the latest North West business to raise Northern Powerhouse Investment Fund II funding. Founded in 2020, CloudGuard specialises in automation and AI-led cyber attack detection, protection and response services to help businesses proactively remove threats in real time. It intends to create up to 20 new cybersecurity jobs over the next 12 months, taking its workforce to 50, and strengthen its AI research partnerships with Manchester universities. CloudGuard raised the money from NPIF II – Praetura Equity Finance, which is managed by Praetura Ventures as part of the Northern Powerhouse Investment Fund. <a href="https://businesscloud.co.uk/news/manchesters-cloudguard-secures-multi-million-pound-backing/">Full Story</a></p>
https://businesscloud.co.uk/news/manchesters-cloudguard-secures-multi-million-pound-backing/
cybersecurityventures:672ca17c2c760a03171e016dThu, 07 Nov 2024 00:00:00 GMTCorgea raises $2.5M in seed funding<p>Source: Zawya</p><br><p>Corgea, a pioneering cybersecurity startup specializing in AI-driven vulnerability detection and remediation, announced that it has raised $2.5 million in seed funding. The round was led by Shorooq Partners, with participation from prominent investors Y Combinator (YC), Propeller, Decacorn Capital, Unbound Ventures, and various prominent angels such as Jawed Karim (co-founder of Youtube & Y Ventures) and Sam Kassoumeh (Co-founder of SecurityScoreCard). This funding round marks a significant milestone for Corgea as it seeks to scale its platform and expand its operations within the US and across the Middle East and beyond. <a href="https://www.zawya.com/en/press-release/companies-news/shorooq-leads-corgeas-26mln-seed-round-to-revolutionize-cybersecurity-with-ai-driven-vulnerability-remediation-ttezp6x4">Press Release</a></p>
https://www.zawya.com/en/press-release/companies-news/shorooq-leads-corgeas-26mln-seed-round-to-revolutionize-cybersecurity-with-ai-driven-vulnerability-remediation-ttezp6x4
cybersecurityventures:672b4fe6aee15402df1aaad9Wed, 06 Nov 2024 00:00:00 GMTSymbiotic Security helps developers find bugs as they code<p>Source: TechCrunch</p><br><p>New York City-based Symbiotic Security, which is announcing a $3 million seed round, watches over developers as they code and points out potential security issues in real time. Other companies do this, but Symbiotic also emphasizes the next step: teaching developers to avoid these bugs in the first place. Ideally, this means developers will fix security bugs before they ever get into a code repository, which in turn should also speed up the overall development process. <a href="https://techcrunch.com/2024/11/05/symbiotic-security-helps-developers-find-bugs-as-they-code/">Full Story</a></p>
https://techcrunch.com/2024/11/05/symbiotic-security-helps-developers-find-bugs-as-they-code/
cybersecurityventures:672b5f2041a64302a7db3c47Wed, 06 Nov 2024 00:00:00 GMTBugcrowd Secures $50 Million Growth Capital Facility from Silicon Valley Bank<p>Source: Silicon Valley Bank</p><br><p>Silicon Valley Bank (SVB), a division of First Citizens Bank, today announced it has provided a $50 million growth capital facility to Bugcrowd, a leading provider of crowdsourced cybersecurity solutions. Bugcrowd brings the collective ingenuity of organizations and hackers to mitigate vulnerabilities across all applications, systems, and infrastructure. Provided by SVB’s Enterprise Software Group, the new financing will further scale Bugcrowd’s AI-powered platform globally, fund continued innovation into the Bugcrowd Platform, and leverage opportunities for strategic M&A, providing added value to clients, partners, and the hacker community. <a href="https://www.svb.com/news/client-news/bugcrowd-secures-$50-million-growth-capital-facility-from--silicon-valley-bank/">Press Release</a></p>
https://www.svb.com/news/client-news/bugcrowd-secures-$50-million-growth-capital-facility-from--silicon-valley-bank/
cybersecurityventures:6724b6521adf2102d007533aFri, 01 Nov 2024 00:00:00 GMTAI security platform Noma raises $25 million Series A<p>Source: CTech</p><br><p>Noma, a company developing a platform for AI security, has raised $25 million in a Series A round led by Ballistic Ventures. This comes less than a year after a $7 million Seed round led by Glilot Capital Partners, with participation from Cyber Club London. The rounds attracted dozens of strategic angel investors, including current and former CISOs of McDonald's, Google DeepMind, Twitter, Atlassian, BNP Paribas, T-Mobile, and Nielsen. Noma’s platform provides end-to-end AI discovery, security, protection, and compliance. <a href="https://www.calcalistech.com/ctechnews/article/b1ka3g11zkx">Full Story</a></p>
https://www.calcalistech.com/ctechnews/article/b1ka3g11zkx
cybersecurityventures:6724b6fcc6ba49030e98b057Fri, 01 Nov 2024 00:00:00 GMTNillion network raises $25M for decentralized privacy solutions<p>Source: Cointelegraph</p><br><p>The Nillion network has secured $25 million in a new funding round to support its decentralized privacy platform, which offers an optional blockchain component. This marks the network’s second fundraising round this year, following a previous round in February. Hack VC led the Oct. 30 round. Nillion claims to have built the world’s first Blind Computer. There are over 40 builders in the ecosystem, which is hosted on Cosmos. They include developers from Near, Aptos, Arbitrum, Mantle, IO.net and Ritual, among others AI agents, data marketplaces, private DeFi and healthcare analysts. <a href="https://cointelegraph.com/news/nillion-network-funding-decentralized-privacy-solutions">Full Story</a></p>
https://cointelegraph.com/news/nillion-network-funding-decentralized-privacy-solutions
cybersecurityventures:672372e2dd7f9102cc99839aThu, 31 Oct 2024 00:00:00 GMTCybersecurity firm FAT32 seals £550,000 investment to trigger growth<p>Source: Business Live</p><br><p>A UK-based cybersecurity business has become the first to secure investment from the Venture Sunderland Fund. FAT32 has secured a £550,000 finance deal, which includes £350,000 from the fund which was launched earlier this month by fund managers Northstar Ventures. The Sunderland business is making changes in the regulatory tech industry, helping to transform cyber-security compliance from a lengthy chore to an effortless process, with potential cost savings of up to 70 percent. The business says customers using its flagship OneClickComply tool can complete compliance tasks up to 20 times faster than traditional methods. <a href="https://www.msn.com/en-gb/money/other/sunderland-cyber-security-firm-seals-550000-investment-to-trigger-growth/ar-AA1tcMkl?ocid=BingNewsVerp">Full Story</a></p>
https://www.msn.com/en-gb/money/other/sunderland-cyber-security-firm-seals-550000-investment-to-trigger-growth/ar-AA1tcMkl?ocid=BingNewsVerp
cybersecurityventures:6723abea249f880318813590Thu, 31 Oct 2024 00:00:00 GMTZenity raises $38 million Series B to protect AI copilots from cyber threats<p>Source: CTech</p><br><p>Zenity, which specializes in AI-based cybersecurity, has raised $38 million in a Series B funding round led by Third Point Ventures and DTCP. This round follows a strategic investment by Microsoft’s venture fund, M12, with additional support from existing investors Intel Capital, UpWest, and Vertex Ventures, bringing Zenity’s total funding to $55 million. Zenity employs 52 people, including 32 in Israel. The new funding will accelerate development and enhance Zenity's platform. This investment will also support Zenity’s expansion in North America, particularly among financial organizations, pharmaceutical companies, and healthcare systems. <a href="https://cybersecurityventures.com//Zenity%20employs%2052%20people,%20including%2032%20in%20Israel.%20The%20new%20funding%20will%20accelerate%20development%20and%20enhance%20Zenity's%20platform,%20which%20secures%20the%20use%20of%20AI%20copilot%20systems%20and%20low-code%20applications%E2%80%94apps%20created%20with%20minimal%20coding.%20This%20investment%20will%20also%20support%20Zenity%E2%80%99s%20expansion%20in%20North%20America,%20particularly%20among%20financial%20organizations,%20pharmaceutical%20companies,%20and%20healthcare%20systems.">Full Story</a></p>
https://cybersecurityventures.com//Zenity%20employs%2052%20people,%20including%2032%20in%20Israel.%20The%20new%20funding%20will%20accelerate%20development%20and%20enhance%20Zenity's%20platform,%20which%20secures%20the%20use%20of%20AI%20copilot%20systems%20and%20low-code%20applications%E2%80%94apps%20created%20with%20minimal%20coding.%20This%20investment%20will%20also%20support%20Zenity%E2%80%99s%20expansion%20in%20North%20America,%20particularly%20among%20financial%20organizations,%20pharmaceutical%20companies,%20and%20healthcare%20systems.
cybersecurityventures:6722167adddc7003090d856fWed, 30 Oct 2024 00:00:00 GMTData Loss Prevention Startup MIND Emerges From Stealth With $11M in Funding<p>Source: Accesswire</p><br><p>MIND, the upcoming leader in data loss prevention (DLP), emerged from stealth with $11 million in seed round funding led by YL Ventures with participation from leaders of public cybersecurity companies. MIND was founded in 2023 by Eran Barak, who previously founded Hexadite which was later acquired by Microsoft, Itai Schwartz, Co-Founder and CTO, who was the first employee at Torq, a security automation startup, and at Axonius, an asset management unicorn startup, and Hod Bin Noon, Co-Founder and VP of R&D, who was the first employee at Dazz, specializing in real-time vulnerability detection and remediation. The co-founders have decades of cyber experience and served in leadership roles in the prestigious Israeli Military Intelligence Unit 8200. <a href="https://markets.businessinsider.com/news/stocks/data-loss-prevention-startup-mind-emerges-from-stealth-with-11m-in-funding-to-revolutionize-data-security-1033917570">Full Story</a></p>
https://markets.businessinsider.com/news/stocks/data-loss-prevention-startup-mind-emerges-from-stealth-with-11m-in-funding-to-revolutionize-data-security-1033917570
cybersecurityventures:6722b5fca9c3ea0293319fe4Wed, 30 Oct 2024 00:00:00 GMTArmis Raises $200M At $4.2B Valuation<p>Source: citybiz</p><br><p>Armis, a San Francisco-based cyber exposure management and security company, closed a $200 million Series D funding, increasing its total company valuation to a new high of $4.2 billion. The round was led by General Catalyst and Alkeon Capital, with participation from existing investors Brookfield Technology Partners and Georgian. The company intends to use the funds to accelerate organic product innovation and global go-to-market programs. This new round of funding comes after Armis recently announced it had surpassed the $200 million USD in Annual Recurring Revenue (ARR) mark, growing ARR by an additional $100 million in less than 18 months. The company is targeting a future IPO. <a href="https://www.citybiz.co/article/618933/armis-raises-200m-at-4-2b-valuation-2/">Full Story</a></p>
https://www.citybiz.co/article/618933/armis-raises-200m-at-4-2b-valuation-2/
cybersecurityventures:6720c82757bc2602c3f7e7f0Tue, 29 Oct 2024 00:00:00 GMTUK-based CybaVerse gets €1.3 million to simplify cyber security management for SMEs<p>Source: EU-Startups</p><br><p>CybaVerse, a rapidly advancing player in the cybersecurity space, has secured over €1.3 million in funding, fueling its bold vision for growth and innovation. Backed by FSE Group, Haatch, Founder & Lightning, and several angel investors, including FSE angels and the University of Sussex Business Angels group, this milestone highlights CybaVerse’s momentum as it redefines the future of cybersecurity with its SaaS platform, CybaVerse AI. The funding will drive team expansion and accelerate development of the platform, with the company recently appointing three senior leaders to spearhead this exciting next chapter. <a href="https://www.eu-startups.com/2024/10/uk-based-cybaverse-gets-e1-3-million-to-simplify-cyber-security-management-for-smes/">Full Story</a></p>
https://www.eu-startups.com/2024/10/uk-based-cybaverse-gets-e1-3-million-to-simplify-cyber-security-management-for-smes/
cybersecurityventures:671f6f16764f4702e43b1f79Mon, 28 Oct 2024 00:00:00 GMTConcentric AI secures $45m for AI-driven data security advancements<p>Source: FinTech Global</p><br><p>Concentric AI, a prominent provider of AI-based data security solutions, has successfully raised $45 million in a Series B financing round. This investment boosts the company’s total funding to more than $67 million. Insights into the company’s growth reveal a 300 percent increase in year-over-year growth and a tripling of its customer base in less than six months. The rising adoption of Generative AI solutions in enterprise settings, such as Microsoft Copilot, has further propelled the demand for sophisticated data security governance capable of securing enterprise GenAI tools and AI assistants. <a href="https://fintech.global/2024/10/28/concentric-ai-secures-45m-for-ai-driven-data-security-advancements/">Full Story</a></p>
https://fintech.global/2024/10/28/concentric-ai-secures-45m-for-ai-driven-data-security-advancements/
cybersecurityventures:671f72e86d5fe7031b09ce68Mon, 28 Oct 2024 00:00:00 GMT
```
http://localhost:1200/cybersecurityventures/news/mergers-and-acquisitions-report - Success ✔️
```rss
M&A Tracker - Cybercrime Magazine
https://cybersecurityventures.com//mergers-and-acquisitions-report
M&A Tracker - Cybercrime Magazine - Powered by RSSHubRSSHubcontact@rsshub.app (RSSHub)enFri, 22 Nov 2024 04:55:37 GMT5N-able to Acquire Cybersecurity Platform Adlumin<p>Source: MarketWatch</p><br><p>Software company N-able said Nov. 19 it has acquired cybersecurity platform and existing strategic partner Adlumin. The deal will include about $100 million cash and 1.58 million shares on the closing date. The acquisition also includes cash installments of $52.5 million and $67.5 million on the first and second anniversaries of closing the closing date. The deal will have up to $30 million of potential cash earn-outs payable in 2025 and 2026 based on certain performance metrics for 2024 and 2025. N-able said the acquisition will help scale its security portfolio and fast-growing annual recurring revenue from the existing partnership, and deliver deeper insights and remediation across internal IT teams. <a href="https://www.marketwatch.com/story/n-able-to-acquire-cybersecurity-platform-adlumin-7c935047?mod=dj-newswires">Full Story</a></p>
https://www.marketwatch.com/story/n-able-to-acquire-cybersecurity-platform-adlumin-7c935047?mod=dj-newswires
cybersecurityventures:673f25415159440315f4a2a6Thu, 21 Nov 2024 00:00:00 GMTEnzoic Announces Acquisition of VeriClouds<p>Source: Businesswire</p><br><p>Boulder, Colo.-based Enzoic announced the acquisition of VeriClouds, a pioneer in compromised password data collection. This acquisition will unite the strengths of both companies, enabling Enzoic to deliver even more innovative solutions under its established brand. Together, Enzoic and VeriClouds aim to redefine the compromised credential marketplace with deeper data insights and enhanced capabilities. The merger will enhance the threat intelligence services offered by both companies, integrating over 3,000 monitored sources from VeriClouds and additional data sources from Enzoic. <a href="https://www.businesswire.com/news/home/20241112512062/en/Enzoic-Announces-Acquisition-of-VeriClouds">Press Release</a></p>
https://www.businesswire.com/news/home/20241112512062/en/Enzoic-Announces-Acquisition-of-VeriClouds
cybersecurityventures:673f260d053a3402f1ddea38Tue, 19 Nov 2024 00:00:00 GMTBitSight buys dark web security specialist Cybersixgill for $115M<p>Source: TechCrunch</p><br><p>More consolidation is afoot in the world of cybersecurity. BitSight, a cybersecurity startup last valued at $2.4 billion when ratings firm Moody’s took a majority stake in the business in 2021, is acquiring Cybersixgill for $115 million. Boston, Mass.-based BitSight’s focus is cyber risk management. It works with enterprises to assess their risk profiles and specifically the likelihood that they will be breached, which covers not just evaluating a company’s attack surface across its network and other digital assets, but also the products that it uses to defend these. The smaller company, based out of Israel, originally launched as Sixgill. <a href="https://techcrunch.com/2024/11/14/bitsight-buys-dark-web-security-specialist-cybersixgill-for-115m/">Full Story</a></p>
https://techcrunch.com/2024/11/14/bitsight-buys-dark-web-security-specialist-cybersixgill-for-115m/
cybersecurityventures:67362e10d4a95a02c962f15aThu, 14 Nov 2024 00:00:00 GMTSnyk Expands API Security Testing With Acquisition Of Probely<p>Source: CRN</p><br><p>Snyk on Nov. 12 announced its acquisition of a vendor that focuses on providing security testing for APIs as well as web application security. The integration of technology developed by the firm, Probely, will enhance Snyk’s developer security software offering and enable greater support for AI-related development, Snyk Chief Innovation Officer Manoj Nair told CRN. Founded in 2016, Probely offers what Nair described as a “modern” approach to DAST (Dynamic Application Security Testing), something which Snyk’s platform has not offered previously. <a href="https://www.crn.com/news/security/2024/snyk-expands-api-security-testing-with-acquisition-of-probely">Full Story</a></p>
https://www.crn.com/news/security/2024/snyk-expands-api-security-testing-with-acquisition-of-probely
cybersecurityventures:67363563c7c0fc02b191bba8Thu, 14 Nov 2024 00:00:00 GMTTrustwave and Cybereason merge<p>Source: ITWire</p><br><p>Trustwave, a cybersecurity and managed security services leader, and Cybereason, a leading Endpoint Detection and Response (EDR) company, have announced a definitive merger agreement offering a comprehensive and expanded suite of cybersecurity solutions to stay ahead of the rapidly evolving threat landscape. With SoftBank as the majority investor, this strategic consolidation combines market-leading capabilities in Managed Detection and Response (MDR), EDR, offensive security, security research, Digital Forensics and Incident Response (DFIR), and elite threat intelligence services. <a href="https://itwire.com/guest-articles/company-news/trustwave-and-cybereason-merge-to-form-global-mdr-powerhouse-for-unparalleled-cybersecurity-value.html">Full Story</a></p>
https://itwire.com/guest-articles/company-news/trustwave-and-cybereason-merge-to-form-global-mdr-powerhouse-for-unparalleled-cybersecurity-value.html
cybersecurityventures:67349a73448a7b0312cf1cd5Wed, 13 Nov 2024 00:00:00 GMTMalwarebytes Acquires AzireVPN<p>Source: FINSMES</p><br><p>Malwarebytes, a Santa Clara, Calif.-based company which specializes in real-time cyber protection solutions, acquired AzireVPN, a privacy-focused VPN provider. The amount of the deal was not disclosed. By integrating AzireVPN’s advanced VPN technologies and intellectual property into its platform, Malwarebytes will deliver increased flexibility and enhanced security for customers. Malwarebytes delivers endpoint protection, privacy and threat prevention solutions worldwide. It is now used by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. <a href="https://www.finsmes.com/2024/11/malwarebytes-acquires-azirevpn.html">Full Story</a></p>
https://www.finsmes.com/2024/11/malwarebytes-acquires-azirevpn.html
cybersecurityventures:6731e7b18ff87203013e8e4cMon, 11 Nov 2024 00:00:00 GMTHealth Catalyst Signs Definitive Agreement to Acquire Top-Rated Cybersecurity Provider, Intraprise Health<p>Source: PR Newswire</p><br><p>Health Catalyst, Inc. (NASDAQ: HCAT), a leading provider of data and analytics technology and services to healthcare organizations, announced it has signed a definitive agreement to acquire Intraprise Health, LLC, a tech-enabled cybersecurity provider offering an end-to-end cybersecurity risk management platform and services to protect its clients from cyberattacks and manage follow-on liability in the event of an incident. Health Catalyst anticipates the acquisition will close in the fourth quarter of 2024. <a href="https://www.prnewswire.com/news-releases/health-catalyst-signs-definitive-agreement-to-acquire-top-rated-cybersecurity-provider-intraprise-health-302297976.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/health-catalyst-signs-definitive-agreement-to-acquire-top-rated-cybersecurity-provider-intraprise-health-302297976.html
cybersecurityventures:672cafaaeb53ba02e1e9da9bThu, 07 Nov 2024 00:00:00 GMTCrowdStrike to Acquire Adaptive Shield for around $300M<p>Source: Businesswire</p><br><p>CrowdStrike (NASDAQ: CRWD) announced it has agreed to acquire Adaptive Shield, a leader in SaaS Security. Calcalist has learned that CrowdStrike will pay <a href="https://www.calcalistech.com/ctechnews/article/s1zuniozkx">around $300 million</a> for the Israeli company. With this acquisition, CrowdStrike will be the only cybersecurity vendor to provide unified, end-to-end protection against identity-based attacks across the entire modern cloud ecosystem – from on-premises Active Directory to cloud-based identity providers and SaaS applications – delivered from a single, unified platform. Announced at Fal.Con Europe, CrowdStrike’s inaugural premier user conference in the region, this acquisition will position CrowdStrike as the leading provider of comprehensive protection across complex hybrid environments. <a href="https://ir.crowdstrike.com/news-releases/news-release-details/crowdstrike-acquire-adaptive-shield-deliver-only-platform">Press Release</a>
</p>
https://www.calcalistech.com/ctechnews/article/s1zuniozkx
cybersecurityventures:672b5da6da5c4602bbddac36Wed, 06 Nov 2024 00:00:00 GMTEverfox acquires Yakabod in Insider Risk deal<p>Source: Businesswire</p><br><p>Everfox, a recognized global provider of insider risk solutions and services across government, defense and critical infrastructure, announced today that it has acquired Yakabod Inc, a leading provider of case management software for security-driven organizations. This acquisition solidifies the multi-year partnership between Everfox and Yakabod as they jointly enhanced governance capabilities across insider risk, cyber incident management and other security-focused use cases. The insider risk mission has become one of the most critical challenges facing government and highly regulated customers. <a href="https://www.businesswire.com/news/home/20241101130572/en/CORRECTING-and-REPLACING-Everfox-Purchases-Yakabod-Inc-to-Enhance-Governance-for-the-Insider-Risk-Mission">Press Release</a></p>
https://www.businesswire.com/news/home/20241101130572/en/CORRECTING-and-REPLACING-Everfox-Purchases-Yakabod-Inc-to-Enhance-Governance-for-the-Insider-Risk-Mission
cybersecurityventures:672a13a8b6df3b0302a6e534Tue, 05 Nov 2024 00:00:00 GMTLondon-based UBDS buys 3B Data Security<p>Source: CRN</p><br><p>London-based technology services incubator UBDS Group has acquired 3B Data Security to enhance its cyber offering. The newly acquired cybersecurity MSP will remain autonomous and keep its brand identity intact, as well as its 23 employees, including the management team. Cambridge-based 3B Data Security provides Cybersecurity services, including digital forensic incident response, security training, information security consulting, and penetration testing. <a href="https://www.channelweb.co.uk/news/2024/ubds-3b-data-security">Full Story</a></p>
https://www.channelweb.co.uk/news/2024/ubds-3b-data-security
cybersecurityventures:672a14620362d602c0d9b2d9Tue, 05 Nov 2024 00:00:00 GMTLumifi Expands Service Offerings with Critical Insight Acquisition<p>Source: Channel Futures</p><br><p>Lumifi, a managed detection and response (MDR) provider, has acquired cybersecurity-as-a-service provider Critical Insight. This marks Lumifi’s third acquisition in 13 months. It expands the company's service offerings, and strengthens its presence in the health care and critical infrastructure cybersecurity sector. The acquisition adds to Lumifi's existing offerings, including its 24/7 security operations center (SOC), MDR and ShieldVision platform. Critical Insight's incident response capabilities complement Lumifi's threat monitoring, while its professional services expand the ability to provide tailored cybersecurity strategies. <a href="https://www.channelfutures.com/mergers-acquisitions/lumifi-acquires-critical-insight">Full Story</a></p>
https://www.channelfutures.com/mergers-acquisitions/lumifi-acquires-critical-insight
cybersecurityventures:6728cd4842c30902f0a72cdfMon, 04 Nov 2024 00:00:00 GMTProofpoint Signs Definitive Agreement to Acquire Normalyze<p>Source: Businesswire</p><br><p>Proofpoint Inc., a leading cybersecurity and compliance company, announced it has entered into a definitive agreement to acquire Normalyze, a leader in Data Security Posture Management (DSPM). The acquisition is expected to close in November 2024, subject to customary closing conditions. With this acquisition, Proofpoint will further enhance its human-centric security platform with Normalyze’s leading AI-powered DSPM technology, allowing organizations to discover, classify and protect data at scale across SaaS, PaaS, public or multi-cloud, on-prem and hybrid environments, while prioritizing the reduction of human-centric risks in data security. <a href="https://www.businesswire.com/news/home/20241029400659/en/Proofpoint-Signs-Definitive-Agreement-to-Acquire-Normalyze">Press Release</a></p>
https://www.businesswire.com/news/home/20241029400659/en/Proofpoint-Signs-Definitive-Agreement-to-Acquire-Normalyze
cybersecurityventures:672215775d0a6802c1306c4dWed, 30 Oct 2024 00:00:00 GMTSocure inks $136M deal to acquire AI-powered risk decisioning platform Effectiv<p>Source: FinTech Future</p><br><p>U.S. digital identity verification and fraud prevention platform Socure is set to acquire Effectiv, a San Francisco-based start-up specialising in risk decisioning, for $136 million. Expected to close next month, the deal will see Effectiv’s AI-powered orchestration and decisions platform integrated with Socure’s digital ID tech, enabling Socure to offer real-time payments fraud and anti-money laundering (AML) transaction monitoring as part of a new suite of transaction-level solutions. The acquisition will see the entire Effectiv team join Socure. <a href="https://www.fintechfutures.com/2024/10/socure-inks-136m-deal-to-acquire-ai-risk-decisioning-platform-effectiv/">Full Story</a></p>
https://www.fintechfutures.com/2024/10/socure-inks-136m-deal-to-acquire-ai-risk-decisioning-platform-effectiv/
cybersecurityventures:6720c8bbfd147002e6754a1bTue, 29 Oct 2024 00:00:00 GMTSophos to acquire Secureworks for $859 million<p>Source: The Record</p><br><p>U.K.-based Sophos is acquiring Secureworks, for about $859 million, the two companies announced Oct. 21. Secureworks, based in Atlanta, is currently listed on Nasdaq stock exchange. The all-cash acquisition will is expected to close in early 2025, the companies said. Tech giant Dell owns about 79 percent of Secureworks after taking it public in 2016. Sophos is backed by investment firm Thoma Bravo, which acquired it in 2020 for an estimated $3.9 billion. Both firms are known for producing widely cited cybersecurity research. <a href="https://therecord.media/sophos-to-acquire-secureworks-859-million">Full Story</a></p>
https://therecord.media/sophos-to-acquire-secureworks-859-million
cybersecurityventures:6716788ba91f9902cafb688bMon, 21 Oct 2024 00:00:00 GMTCyera acquires Trail Security for $162M<p>Source: TechCrunch</p><br><p>Cyera, the Israel-founded, U.S.-based cybersecurity unicorn that uses artificial intelligence to build what’s known as data security posture management is acquiring Trail Security, a startup that was still in stealth mode building solutions for data loss prevention. Cyera is paying $162 million for Trail in a mix of cash and shares, Cyera’s CEO and co-founder Yotam Segev told TechCrunch in an interview. Cyera picked up a $300 million Series C at a $1.4 billion valuation in Apr. 2024. TechCrunch has confirmed with sources close to the matter that Cyera is in the process of raising at least $200 million at a pre-money valuation of around $3 billion. <a href="https://techcrunch.com/2024/10/17/cyera-acquires-trail-security-for-162m-cyera-is-now-raising-at-a-3b-valuation/">Full Story</a></p>
https://techcrunch.com/2024/10/17/cyera-acquires-trail-security-for-162m-cyera-is-now-raising-at-a-3b-valuation/
cybersecurityventures:6710f6b270d52f0317a05745Thu, 17 Oct 2024 00:00:00 GMTLeeds Equity Partners Acquires OffSec<p>Source: PR Newswire</p><br><p>Leeds Equity Partners announced that it has acquired OffSec, a provider of continuous cybersecurity workforce development training and professional education for cybersecurity practitioners from Spectrum Equity. Terms of the transaction were not disclosed. OffSec has been providing cybersecurity training for over 15 years, offering practical, hands-on skills development through a proprietary learning platform that includes thousands of hours of content, more than 4,000 labs, and 12 industry-standard certifications. The Company's certifications are globally recognized by employers and cybersecurity practitioners for their rigor and relevance for the most critical cybersecurity roles. <a href="https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html">Press Release</a></p>
https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html
cybersecurityventures:670fa7b790a44702ff03cfb2Wed, 16 Oct 2024 00:00:00 GMTMarlink Fortifies Cybersecurity Offerings with Port-IT Acquisition<p>Source: MarineLink</p><br><p>Marlink acquired Port-IT, a leader in cybersecurity solutions tailored for the maritime industry. Port-IT brings the combination of a state-of-the-art cybersecurity solutions portfolio together with a long-standing experience in the maritime industry. Marlink Group will create a dedicated cyber security unit, by combining the capabilities of Port-IT, Diverto (a recent managed services acquisition) and its own cybersecurity activities, that will comprise a team of 130 with recognized cybersecurity certifications and long-standing experience in maritime, energy, humanitarian and critical infrastructure sectors, and four Security Operations Centers located in Europe, Asia and Americas. <a href="https://www.marinelink.com/news/marlink-fortifies-cyber-security-offer-518083">Full Story</a></p>
https://www.marinelink.com/news/marlink-fortifies-cyber-security-offer-518083
cybersecurityventures:670e4df404459e02c26d0984Tue, 15 Oct 2024 00:00:00 GMTCrashPlan acquires Parablu to strengthen cloud backup and data resilience offerings<p>Source: siliconANGLE</p><br><p>Cloud protection and backup provider CrashPlan Group LLC announced that it has acquired enterprise data backup and recovery solutions company Parablu Inc. for an undisclosed sum. Founded in 2014, Parablu specializes in providing secure backup and data management solutions with a primary focus on protecting business-critical data in hybrid and multicloud environments. The company offers a suite of services designed to ensure data safety, privacy and regulatory compliance while also protecting against cybersecurity threats, including ransomware. <a href="https://siliconangle.com/2024/10/08/crashplan-acquires-parablu-strengthen-cloud-backup-data-resilience-offerings/">Full Story</a></p>
https://siliconangle.com/2024/10/08/crashplan-acquires-parablu-strengthen-cloud-backup-data-resilience-offerings/
cybersecurityventures:670d0382187772030e14779fMon, 14 Oct 2024 00:00:00 GMTPan-European cybersecurity giant Conscia expands with PlanNet21 acquisition<p>Source: Tech.eu</p><br><p>Conscia, a pan-European provider of cybersecurity and networking solutions for mission-critical IT infrastructure in large organisations has acquired PlanNet21 Group, a provider of cybersecurity, networking, and managed services operating in the Irish and UK markets. Conscia and PlanNet21 Group have both been servicing public organisations and private enterprises with cybersecurity, secure networking, IT infrastructure and hybrid cloud solutions for more than 20 years. Dublin, Ireland-based PlanNet21 Group experienced rapid growth and revenues of close to €70 million last year. <a href="https://tech.eu/2024/10/14/pan-european-cybersecurity-giant-conscia-expands-with-plannet21-acquisition/">Full Story</a></p>
https://tech.eu/2024/10/14/pan-european-cybersecurity-giant-conscia-expands-with-plannet21-acquisition/
cybersecurityventures:670d064f64cd190300a252d5Mon, 14 Oct 2024 00:00:00 GMTSynerion Acquires Qumulex<p>Source: citybiz</p><br><p>Synerion USA Inc., a Southlake, Texas-based provider of cloud-based workforce management software, acquired Qumulex, a Fishers, Ind. innovator in cloud-based video surveillance and access control solutions. This strategic acquisition strengthens Synerion’s portfolio, expanding its offerings into the security market. The integration of Qumulex’s capabilities will enhance Synerion’s offerings in the B2B technology space. Synerion is a leader in Cloud B2B technology and physical access control. With over 40 years of experience, the company serves thousands of customers across a wide range of industries. <a href="https://www.citybiz.co/article/609848/synerion-acquires-qumulex/">Press Release</a></p>
https://www.citybiz.co/article/609848/synerion-acquires-qumulex/
cybersecurityventures:67050fcd1419e80325d25d67Tue, 08 Oct 2024 00:00:00 GMT
```
Involved Issue / 该 PR 相关 Issue
Close #17664
Example for the Proposed Route(s) / 路由地址示例
New RSS Route Checklist / 新 RSS 路由检查表
Puppeteer
Note / 说明