article thumbnail

Learning From the Past — Ten 2022 Cybersecurity Events to Know

Palo Alto Networks

23, a new variant of wiper malware, named HermeticWiper, was discovered in Ukraine. In January 2022, Unit 42 researchers were able to map out three large clusters of Gamaredon’s infrastructure used to support different phishing and malware purposes. Top Malware. Beginning on Feb. Threat Assessment: BlackCat Ransomware.

Malware 68
article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

Critical Infrastructure.” This alert focuses on observed behavior from Russian state-sponsored threat groups targeting critical infrastructure organizations in several countries. Once they have domain level privileges, they will use Group Policy to distribute malware and ransomware. Critical Infrastructure. Background.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Curb Your Enthusiasm Over ChatGPT-type Tools at Work, Says U.K.’s NCSC 

Tenable

Plus, the QakBot botnet got torn down, but the malware threat remains – what CISA suggests you do. In a joint advisory, CISA and the FBI detailed the FBI-led international operation to take down the botnet’s infrastructure, while offering guidance for cybersecurity teams about QakBot prevention, detection and remediation measures.

ChatGPT 63
article thumbnail

How Regulation Is Impacting 5G Security in Europe

Palo Alto Networks

We have completed numerous deployments around the world enabling our customers to detect and prevent mobile protocol-specific threats, malware and other vulnerabilities within mobile networks. Annex I, Section 2.2 Annex I, Section 2.2 The post How Regulation Is Impacting 5G Security in Europe appeared first on Palo Alto Networks Blog.

article thumbnail

What Is cloud security?

Lacework

Then, in the 1990s, telecommunications companies began experimenting with how they could use bandwidth more effectively through server management, optimizing infrastructure, and designing efficient applications that benefit end users. The decentralized nature of cloud computing makes maintaining security more complex. Secure Endpoints.

Cloud 98
article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

National Security Telecommunications Advisory Committee ( NSTAC ) is out. Ok, the bad news: There’s plenty to do to properly protect the converged IT/OT systems of critical infrastructure facilities. There’s not enough cybersecurity education and training available to the staff of critical infrastructure providers.

article thumbnail

Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group

Tenable

While some cases of extortion involve stealing data and “ransoming” it back to organizations, ransomware specifically refers to incidents when data-encrypting malware (ransomware) is deployed and access to those systems is ransomed back to target organizations. Over the years, ransomware groups have adopted diverse extortion tactics.

Groups 68