Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Chat Logs Expose Ransomware Groups Methods and Styles of Interactions with Victims

Ransomware is a huge shadow over many businesses and individuals’ heads. It has loomed as a significant threat since the first stains hit the internet inside malicious zip files masquerading as “Xerox” documents. Since that time ransomware and the groups behind it have evolved significantly. At the top of the food chain are groups like Hive and Conti who have not only evolved their own tools but utilize strategic approaches to their organizations complete with acquisitions and, in some cases, attempted legitimate business fronts to further their activities.

Details
By Sean Kalinich
Sean Kalinich
May 04
Hits: 1860
  • Security
  • Malware
  • Ransomware
  • ransomware as a service
  • conti
  • malware as a service
  • hive

Read more: Chat Logs Expose Ransomware Groups Methods and...

No comments on “Chat Logs Expose Ransomware Groups Methods and Styles of Interactions with Victims”
Security Talk

Google Says they Will Fight Doxxing, With Some Conditions of Course

Google is an odd company. They have used the personal vs corporate data ownership line like a jump rope over the years. We have watched them for a long time and all we can say is that their track record on protecting personal information and privacy has been both good and bad with them being on the bad side for most of recent history. After being a vehement opposer of bills like SOPA (Stop Online Piracy Act) and PIPA (Protect our Intellectual Property Act) they quickly dropped those stances and started facilitating blanket takedown noticed from the MPAA (now the MPA) and RIAA. The blanket notices often came from law firms that provided little more than links to Google which Google then removed from their search engine and YouTube.

Details
By Sean Kalinich
Sean Kalinich
May 02
Hits: 1779
  • Google
  • Privacy
  • Copyright
  • Personal Data
  • content policy
  • pii
  • doxxing

Read more: Google Says they Will Fight Doxxing, With Some...

No comments on “Google Says they Will Fight Doxxing, With Some Conditions of Course”
Security Talk

Cloud Services Suffer the Same Issue as On Prem Services, they just Hide it Better

It Cloud services are exceptionally popular as a cost effective and simple method to maintain common operational needs. Everything from email to fully fledged infrastructures can be maintained in the “cloud”. All of these can be accomplished at lower overall cost than trying to maintain the same systems on prem. By shifting the general operation, maintenance and even security to the cloud service provider organizations get to reduce their total ownership cost including reducing the number of skilled employees they need to keep on staff. This reduction in the total cost of ownership and maintenance is a huge item when you are trying to ensure profitability.

Details
By Sean Kalinich
Sean Kalinich
May 02
Hits: 2284
  • Security
  • Microsoft
  • Cloud
  • Vulnerabilities
  • cloud security monitoring

Read more: Cloud Services Suffer the Same Issue as On Prem...

No comments on “Cloud Services Suffer the Same Issue as On Prem Services, they just Hide it Better”
Security Talk

Conti has a New Toy as Bumblebee Malware Replaces BazarLoader

April must be the month for new malware tools to be released, or at least announced as we have already heard about new forms of attack/infection from the group behind Emotet and now we hear that Conti has replaced BazarLoader with new malware tracked as Bumblebee. The newly disclosed malware is also under active development with multiple new features showing up this month.

Details
By Sean Kalinich
Sean Kalinich
Apr 29
Hits: 1548
  • Malware
  • Ransomware
  • trickbot
  • conti
  • iab
  • intial access broker
  • bumblebee
  • baxarloader

Read more: Conti has a New Toy as Bumblebee Malware...

No comments on “Conti has a New Toy as Bumblebee Malware Replaces BazarLoader”
Security Talk

More Flaws Found in NPM Allowing Attackers to Attach Malicious Packages to Known Good Devs.

A new flaw has been identified in the Node.js package manager, NPM. The flaw is being described as a logical flaw, but in reading over the data it seems more like a permissions flaw. The good news is that as of April 26, the flaw has been addressed by NPM, the bad is that it was in play until then. According to the researchers that discovered it, the flaw related to the way you can attach other accounts to an uploaded package.

Details
By Sean Kalinich
Sean Kalinich
Apr 27
Hits: 1342
  • Open Source
  • Flaws
  • Vulnerabilities
  • supply chain attack
  • npm
  • nodejs

Read more: More Flaws Found in NPM Allowing Attackers to...

No comments on “More Flaws Found in NPM Allowing Attackers to Attach Malicious Packages to Known Good Devs.”

More Articles …

  1. Yet Another New Attack Method Shows Up From the Group Behind Emotet
  2. The Group Behind Emotet is Looking to Get Around Microsoft’s VBA Changes
  3. Amazon’s Awkward Moment as Log4J Fix has an Escalation and Escape Bug
  4. Okta now says Lapsus$ only had 25 Minutes of Fame with Two Clients
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14

Page 10 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech