theft
-
Blog
Krispy Kreme breach, data theft claimed by Play ransomware gang
The Play ransomware gang has claimed responsibility for a cyberattack that impacted the business operations of the U.S. doughnut chain Krispy Kreme in November. Krispy Kreme disclosed the incident and subsequent disruptions to its online ordering system in an SEC filing submitted on December 11. The company detected unauthorized activity on some of its information technology systems on November 29.…
Read More » -
Blog
Clop ransomware claims responsibility for Cleo data theft attacks
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data. Cleo is the developer of the managed file transfer platforms Cleo Harmony, VLTrader, and LexiCom, which companies use to securely exchange files between their business partners and customers. In October, Cleo fixed a vulnerability…
Read More » -
Blog
Cleo patches critical zero-day exploited in data theft attacks
Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data theft attacks. In October, the company patched a pre-auth remote code execution vulnerability (CVE-2024-50623) in its managed file transfer software and recommended that “all customers upgrade immediately.” Huntress security researchers first spotted evidence of attacks targeting fully patched Cleo software…
Read More » -
Blog
How to Secure a Windows Desktop Against Theft
Key Takeaways Use a Kensington Lock or security screws to physically secure your desktop PC from theft. Enable Find My Device in Windows to track or control your stolen computer remotely. Encrypt your hard drives and consider anti-theft software like Bitdefender to protect your data and track your desktop. With the popularity of laptops, the theft of laptops is probably…
Read More » -
Blog
CISA says BianLian ransomware now focuses only on data theft
The BianLian ransomware operation has shifted its tactics, becoming primarily a data theft extortion group, according to an updated advisory from the U.S. Cybersecurity & Infrastructure Security Agency, the FBI, and the Australian Cyber Security Centre. This new information comes in an update to a joint advisory released in May by the same agencies, which warned about BianLian’s shifting tactics involving…
Read More » -
Blog
How to Turn On Android’s Theft Protection Feature
Ever felt that mini heart attack when you can’t find your phone? Maybe it slipped out of your pocket, or worse, got swiped by someone. Either way, it’s not fun. Luckily, Android’s got your back with a nifty feature called Theft Protection. And the best part? It works on any phone running Android 10 or later. In a world where…
Read More » -
Blog
What is Nord’s Identity Theft Insurance?
The internet is rife with cybercrime, and identity theft is one of the biggest dangers around, with the FTC receiving over 230,000 reports of identity theft in Q4 2023 alone. Hackers can steal personally identifiable information via phishing attacks and/or data breaches and use that to commit identity theft, which, in simple terms, implies stealing someone else’s identity to commit…
Read More » -
Blog
Best antivirus with identity theft protection in 2024
The antivirus market is competitive, with an increasing number of providers looking to attract your attention. One way they attempt to do this is by offering features beyond traditional antivirus protection, be it cloud backup, a password manager, VPN, or even identity theft protection. The latter is particularly important because identity theft carries many risks, one of the biggest of…
Read More » -
Blog
New Mad Liberator gang uses fake Windows update screen to hide data theft
A new data extortion group tracked as Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to distract while exfiltrating data from the target device. The operation emerged in July and although researchers observing the activity did not seen any incidents involving data encryption, the gang notes on their data leak site that they use AES/RSA…
Read More »