Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Extortion

Researchers Block Two Million Extortion Emails Daily

10 June 2022

Security researchers are warning users to be on the lookout for extortion scams after revealing they block millions of such emails each …

Tags Block, Emails, Extortion, Million, Researchers

How Poor Communication Opens the Door to Ransomware and Extortion

9 June 2022

Imagine the scene: A devastating ransomware attack has immobilized a large manufacturing …

Tags Communications, Doors, Extortion, How, Ransomware

Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices

7 June 2022

The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and …

Tags Computer Hardware, Devices, Extortion, NAS, Ransomware

Karakurt Data Extortion Group

1 June 2022

CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN) have …

Tags Data, Extortion, IT, News

AA22-152A: Karakurt Data Extortion Group

1 June 2022

Initial Intrusion Karakurt does not appear to target any specific sectors, industries, or types of victims. During reconnaissance [TA0043], …

Tags Data, Extortion, IT, News, Security Pro

DDoS Extortion Attack Flagged as Possible REvil Resurgence

25 May 2022

A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the …

Tags Attacks, Cloud, DDoS, Extortion, IT

UK-Based Teen Suspected of Operating LAPSUS$ Data Extortion Group

24 March 2022

Experts claim the notorious data extortion group LAPSUS$ could be the brainchild of a teenager in the United Kingdom. LAPSUS$ is a …

Tags Cyber Attack, Cyber Crime, Data, Extortion, Operating

LAPSUS$: How a Sloppy Extortion Gang Became One of the Most Prolific Hacking Groups

24 March 2022

“I want to send a message to EA by you,” the hacker wrote to me in an encrypted chat. “What is the motive to …

Tags Extortion, Gang, Groups, How, One

Microsoft Investigating Claim of Breach by Extortion Gang

21 March 2022

“We recruit employees/insider at the following!!!!,” the group wrote on March 10, followed by a list of sectors such as …

Tags Breach, Cyber Threats, Extortion, Gang, Hacking

Extortion scheme impersonates government officials, law enforcement

10 March 2022

The FBI issued a public warning this week about a fraud scheme wherein scammers impersonate government officials and law enforcement …

Tags Extortion, IT, News, Scams, Social Engineering

Similarities and Difference Between Ransomware and DDoS Extortion Attacks

8 March 2022

Cybercriminals leverage multiple methods to bring financial gain. Most of the ways are based on infiltrating an organization’s network …

Tags Attacks, DDoS, Differences, Extortion, Ransomware

Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks

5 March 2022

Cybersecurity company Imperva on Friday said it recently mitigated a ransom distributed denial-of-service (DDoS) attack targeting an …

Tags Attacks, Cyber Attack, DDoS, Extortion, Imperva

Extortion DDoS attacks grow stronger and more common

10 January 2022

The end of 2021 saw a rise in the number of distributed denial-of-service incidents that came with a ransom demand from the attackers to …

Tags DDoS attacks, Extortion, IT, News

Ransomware Attackers’ New Tactic: Double Extortion

23 December 2021

So, what is double extortion? When did it …

Tags Data Protection, Double, Extortion, Incident Response, New
Post navigation
Older posts
Page1 Page2 … Page11 Next →
Cookie-Free

NVD

  • CVE-2022-31104 – Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implemen …28 June 2022
  • CVE-2022-34132 – Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the …28 June 2022
  • CVE-2022-34133 – Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerab …28 June 2022
  • CVE-2022-34134 – Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) v …28 June 2022
  • CVE-2022-0875 – The Google Authenticator WordPress plugin before 1.0.5 does not have CSRF check when savin …27 June 2022
  • CVE-2022-1653 – The Social Share Buttons by Supsystic WordPress plugin before 2.2.4 does not perform CSRF …27 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • SolarView Compact 6.00 – ‘pow’ Cross-Site Scripting (XSS)14 June 2022
  • SolarView Compact 6.00 – ‘time_begin’ Cross-Site Scripting (XSS)14 June 2022
  • Old Age Home Management System 1.0 – SQLi Authentication Bypass14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »