As reported by BBC News, Ruja Ignatova, also known as the “missing Cryptoqueen”, has been placed on the FBI’s top 10 most wanted list. The Bulgarian woman, believed to be in her 40s, is wanted for her alleged role in running a cryptocurrency scam known as OneCoin. Federal investigators accuse the fugitive of using the scheme to defraud victims out of more than $4bn (£3.2bn). She has been missing since 2017 when US officials signed an arrest warrant and investigators began closing in on her. In 2014, OneCoin, a self-described cryptocurrency, began offering buyers commission if they sold the currency…
Author: ISBuzz Team
It’s being reported that the emerging Black Basta ransomware gang has managed to hit close to 50 organisations in Anglophone countries since it started operations a few months ago, and appears to aspire to levels of infamy accorded to the likes of Conti or REvil.
As you may know, Russian hacker group Killnet told Reuters that it was continuing a major cyber attack on Lithuania on Tuesday in retaliation for Vilnius’s decision to cease the transit of some goods under European Union sanctions to Russia’s Kaliningrad exclave. via: https://www.reuters.com/world/europe/russian-hacker-group-says-cyber-attacks-continue-lithuania-2022-06-28/
Avast, a global leader in digital security and privacy, has discovered an online community of minors constructing, exchanging and spreading malware, including ransomware and a mix of information stealers and cryptominers. The group lures young users by advertising access to different malware builders and tool kits that allow laypeople to construct malware easily. In some cases, people have to buy access to the malware builder tool in order to join the group, and in others, they can become group members where they are offered the tool for a nominal fee of 5 to 25 Euros. The community uses dedicated Discord servers as a discussion…
Cyble Research Labs observed over 900,000 Kubernetes exposures across the internet. … it emphasizes the existence of seemingly simple misconfiguration practices that might make companies lucrative targets for TAs in the future. Kubernetes, often known as K8s, is an open-source system for automating containerized application deployment, scaling, and administration. K8s incorporates virtual and real machines to create a uniform API interface. Developers can use the Kubernetes API to launch, scale, and manage containerized applications. Kubernetes assists with the management of containers that execute applications and ensures that there is no downtime in a production environment. the United States, at 65%,…
Verizon recently released its 2022 Data Breach Investigations Report, giving businesses vital insights into the state of cybersecurity around the world. It contains an analysis of over 23,000 incidents and 5,200 confirmed breaches, analysed over the past. Overall, Verizon attributes the number-one motive of cyberattacks to financial gain, saying almost four out of five breaches were attributable to organised crime seeking to extort businesses of hefty ransomware sums, backed by insurance pay-out. In the report, Verizon estimates that there has been a 13% increase in ransomware breaches – this is more than in the last 5 years combined. Additionally, 82%…
AMD said it is investigating a potential data breach after RansomHouse, a relatively new data cybercrime operation, claims to have extorted data from the US chipmaker.
Following the FBI’s warning around criminals using deepfakes to apply to remote jobs, Information security experts reacted below highlighting the danger of deepfakes.
As reported in news, USB stick containing an entire city’s personal details has been lost by a Japanese man, Industry leaders reacyed below.