article thumbnail

Microsoft Suffers Breach by Notorious SolarWinds Hackers

SecureWorld News

Microsoft disclosed that it recently fell victim to a cyberattack by Nobelium, the Russian state-sponsored hacking group infamously responsible for the 2020 SolarWinds supply chain attack. The breach, detected on January 12th, allowed the hackers to access email accounts belonging to members of Microsoft's senior leadership team.

article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

Instead of encrypting backup data, BlackMatter instead wipes it clean in some cases. Rather than encrypting backup systems, BlackMatter actors wipe or reformat backup data stores and appliances. Backup your data and put procedures in place for restoration. DarkSide made claims it was shutting down earlier this year.

Backup 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What's the Prescription for Cyber Resilience in Healthcare?

SecureWorld News

billing and electronic payment system operated by Change Healthcare, a big division of UnitedHealth Group, is only the latest, but maybe greatest, example. Worse yet, UnitedHealth Group (parent of Change Healthcare) has already been named in at least six class action lawsuits. The recent cyberattack that took offline the largest U.S.

article thumbnail

How Advances in Cloud Security Can Help with Ransomware

CIO Business Intelligence

Another out-of-date belief is that frequent backups are the best recovery strategy. While that may be true for less capable attacks, an attacker that is already inside a network not only has the opportunity to compromise backups, but also exfiltrate (and ultimately leak) critical data. Close back doors.

Security 105
article thumbnail

Canada data breach exposes government personnel information

Dataconomy

We have over 1.5TB of documents leaked + 3 full backups of CRM for branches (eu, na and au),” boasts the ransomware group on their dark web data leak site. Change your passwords, flick on multi-factor authentication, and keep a close eye on your online wallets and personal accounts.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. Network Device Configurations. Go out there and win!

article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

Spiders and Cats are claiming responsibility for the attack A group known as Scattered Spider is believed to be responsible for the MGM breach, and it reportedly used ransomware made by ALPHV, or BlackCat , a ransomware-as-a-service operation. ALPHV/BlackCat is denying parts of these reports, especially the slot machine hacking attempt.