theft

  • Blog

    Microsoft spots XCSSET macOS malware variant used for crypto theft

    A new variant of the XCSSET macOS modular malware has emerged in attacks that target users’ sensitive information, including digital wallets and data from the legitimate Notes app. The malware is typically distributed through infected Xcode projects. It has been around for at least five years and each update represents a milestone in XCSSET’s development. The current improvements are the first ones…

    Read More »
  • Blog

    Ransomware gang alleges theft of patient data from Michigan health system

    Overnight, ransomware gang BianLian added Aspire Rural Health System to its data leak site, alleging to have stolen a variety of data. This includes patient records, financial information, and email correspondence. Aspire Rural Health System hasn’t confirmed a cyber attack but did note technical disruptions in early January which led to phones and systems being shut down for over 24…

    Read More »
  • Blog

    Is identity theft insurance worth it?

    To say the word “insurance” doesn’t inspire confidence nowadays is putting it lightly. With policies that often feel convoluted and exclusions buried in fine print, it’s easy to be skeptical. So, is identity theft insurance worth it? Well, the answer depends on your circumstances. For instance, identity theft insurance could be wise if you manage multiple financial accounts, use public…

    Read More »
  • Blog

    Krispy Kreme breach, data theft claimed by Play ransomware gang

    ​The Play ransomware gang has claimed responsibility for a cyberattack that impacted the business operations of the U.S. doughnut chain Krispy Kreme in November. Krispy Kreme disclosed the incident and subsequent disruptions to its online ordering system in an SEC filing submitted on December 11. The company detected unauthorized activity on some of its information technology systems on November 29.…

    Read More »
  • Blog

    Clop ransomware claims responsibility for Cleo data theft attacks

    The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data. Cleo is the developer of the managed file transfer platforms Cleo Harmony, VLTrader, and LexiCom, which companies use to securely exchange files between their business partners and customers. In October, Cleo fixed a vulnerability…

    Read More »
  • Blog

    Cleo patches critical zero-day exploited in data theft attacks

    Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data theft attacks. In October, the company patched a pre-auth remote code execution vulnerability (CVE-2024-50623) in its managed file transfer software and recommended that “all customers upgrade immediately.” Huntress security researchers first spotted evidence of attacks targeting fully patched Cleo software…

    Read More »
  • Blog

    How to Secure a Windows Desktop Against Theft

    Key Takeaways Use a Kensington Lock or security screws to physically secure your desktop PC from theft. Enable Find My Device in Windows to track or control your stolen computer remotely. Encrypt your hard drives and consider anti-theft software like Bitdefender to protect your data and track your desktop. With the popularity of laptops, the theft of laptops is probably…

    Read More »
  • Blog

    CISA says BianLian ransomware now focuses only on data theft

    The BianLian ransomware operation has shifted its tactics, becoming primarily a data theft extortion group, according to an updated advisory from the U.S. Cybersecurity & Infrastructure Security Agency, the FBI, and the Australian Cyber Security Centre. This new information comes in an update to a joint advisory released in May by the same agencies, which warned about BianLian’s shifting tactics involving…

    Read More »
  • Blog

    How to Turn On Android’s Theft Protection Feature

    Ever felt that mini heart attack when you can’t find your phone? Maybe it slipped out of your pocket, or worse, got swiped by someone. Either way, it’s not fun. Luckily, Android’s got your back with a nifty feature called Theft Protection. And the best part? It works on any phone running Android 10 or later. In a world where…

    Read More »
  • Blog

    What is Nord’s Identity Theft Insurance?

    The internet is rife with cybercrime, and identity theft is one of the biggest dangers around, with the FTC receiving over 230,000 reports of identity theft in Q4 2023 alone. Hackers can steal personally identifiable information via phishing attacks and/or data breaches and use that to commit identity theft, which, in simple terms, implies stealing someone else’s identity to commit…

    Read More »
Back to top button
close