Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT). The attacks, codenamed “Twisted Panda“come in the backdrop of Russia’s military invasion of Ukraine, prompting a wide range of threat actors to … Read more

Former AWS employee convicted in 2019 Capital One hack

Former AWS employee convicted in 2019 Capital One hack

Forming Amazon Web Services Inc. employee has been convicted in the theft of more than 100 million records belonging to Capital One Financial Corp. in 2019. Paige A. Thompson, who worked for AWS as an engineer until 2016, was found guilty on seven charges, including wire fraud, illegally accessing a protected computer and damaging a … Read more

Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR

Breaches don’t just happen to large enterprises. Threat actors are increasingly targeting small businesses. In fact, 43% of data breaches involved small to medium-sized businesses. But there is a glaring discrepancy. Larger businesses typically have the budget to keep their lights on if they are breached. Most small businesses (83%), however, do not have the … Read more

Kofax Buys Tungsten for Invoice Improvements

Kofax, which works with intelligent automation for digital workflow transformation, has acquired B2B eInvoicing network Tungsten Corporation, according to a press release Monday (June 20). Tungsten works with complex invoice-to-pay processes, per the release, and it also provides a platform for onboarding suppliers, PO exchange, invoice processing, eInvoicing, compliance and payment processing. Meanwhile, Kofax has … Read more

EU Startups Making Waves in the AML Tech Space

The current wave of anti-money laundering (AML) technology has been largely precipitated by a series of directives issued by the European Parliament since 2015. Nevertheless, financial institutions (FIs) operating in the bloc have more to gain than legislative compliance when it comes to intercepting the flow of illicit money. The same tools and frameworks being … Read more

US DoJ Says It Won’t Prosecute Ethical Hackers Under CFAA

On Thursday, the U.S. Department of Justice announced a change in its policy for pressing charges against hackers under the Computer Fraud and Abuse Act (CFAA). The federal agency said it would no longer charge ethical or white hat hackers, ie, those involved in “good-faith security research,” in violation of the CFAA. The announcement comes … Read more

SideWinder Hackers Use Fake Android VPN Apps to Target Pakistani Entities

The threat actor known as SideWinder has added a new custom tool to its arsenal of malware that’s being used in phishing attacks against Pakistani public and private sector entities. “Phishing links in emails or posts that mimic legitimate notifications and services of government agencies and organizations in Pakistan are primary attack vectors of the … Read more

Fake Windows Updates could seize your files and demand $ 5K to restore access – how to avoid it

Yikes! Vicious ransomware is masquerading as Windows Update packages to lure unsuspecting victims into malware hell, and then suddenly, their valued files are rendered inaccessible. If they want them back, they have to fork over Bitcoin. Magniber ransomware is the name of this malicious software – and it’s spreading. According to BleepingComputer, it discovered a … Read more