Ransomware is Utilizing AI for Extortion and Data Brokering. Cybersecurity researchers have uncovered an AI-assisted ransomware group, FunkSec, that emerged in late 2024. According to Check Point Research, FunkSec employs double extortion tactics, combining data theft and encryption to pressure victims into paying unusually low ransoms—sometimes as little as $10,000. The group also acts as […]
Blog
Malware is putting financial instiutions in jeopardy
Malware is putting financial institutions in jeopardy. Brazilian banking institutions are under attack from a custom variant of the AllaKore remote access trojan (RAT), dubbed AllaSenha, according to French cybersecurity firm HarfangLab. The malware, designed to steal banking credentials, uses Azure cloud infrastructure for its command-and-control (C2) operations. Targeted banks include Banco do Brasil, Bradesco, […]
Electrical utility enterprises are increasingly vulnerable
Electrical utility enterprises are increasingly vulnerable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple vulnerabilities affecting Schneider Electric’s Easergy medium voltage protection relays. According to CISA, successful exploitation of these vulnerabilities could lead to serious consequences, including: Exposure of device credentials Denial-of-service conditions Unexpected device reboots Full attacker […]
Hackers are targeting construction firms
Hackers are targeting construction firms. The construction industry is facing growing threats from cyberattacks, with hackers specifically targeting FOUNDATION Accounting Software. Sub-industries such as plumbing, HVAC (heating, ventilation, and air conditioning), and concrete are among those being affected. “Attackers have been observed brute-forcing the software at scale and gaining access simply by using the […]
Malware targets law firms in widespread cyberattacks.
Malware targets law firms in widespread cyberattacks. A key player in these attacks is GootLoader, a stealthy malware. Craftily, it works by gaining access to systems and delivering ransomware or other harmful payloads. GootLoader typically uses search engine poisoning, manipulating results to direct users to compromised WordPress websites where the malware is downloaded. History of […]
Why is Healthcare a Prime Target in Cyber Attacks
Why is Healthcare a prime target in cyber-attacks? Imagine an attack that halts emergency rooms, delays surgeries, or exposes private health data for extortion. This is the reality as cybercriminals target healthcare systems, exploiting the people who rely on them. Since 20121, healthcare has accounts for 17.8% of all breaches and 18.2% of ransomware attacks, […]
Real Time Proactive PAM Strategies are Vital
Real-time proactive PAM strategies are vital. Privileged accounts are frequent targets for attackers, yet many organizations focus on managing access rather than securing the accounts and users themselves. This gap often arises from the complexities of Privileged Access Management (PAM) deployments. As threats evolve, organizations must shift priorities to secure privileged access, preventing trust from […]
Velox Systems Cybersecurity Workshop Insights
On Tuesday, November 12th, Velox Systems and TDS teamed up to host an interactive Cybersecurity/Resiliency Workshop at 10 Barrel Eastside. The event drew attendees from various industries and positions from across Central Oregon. The workshop offered a valuable hands-on learning about cybersecurity. We now provide some Velox Systems Cybersecurity workshop insights. Cybersecurity Workshop Format […]
AI is transforming the landscape of Identity Access Management
AI is transforming the landscape of Identity Access Management (IAM). This is fundamentally changing how organizations manage digital identities and control access to data, systems, and resources. At its core, IAM ensures that access is granted only to those who need it—on a strictly need-to-know basis. AI leverages its advanced analytical capabilities to monitor access […]
Stolen session tokens can wreak havoc on your data
Stolen session tokens can wreak havoc on your data. The Chinese-linked threat actor Evasive Panda is targeting government entities and a religious organization in Taiwan using a previously undocumented toolset called CloudScout. What is CloudScout? According to ESET security researcher Anh Ho, CloudScout does this through the leveraging of stolen web session cookies to […]