Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday. Lichtenstein was charged for his involvement in a money laundering scheme that led to the theft of nearly 120,000 bitcoins (valued at over $10.5 billion […]
Category Archives: Uncategorized
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild. To that, it has added the vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates […]
The proposed rules codify existing temporary directives requiring pipeline and railroad operators to report cyber incidents and create cyber risk management plans. Go to Source Author: Jennifer Lawinski, Contributing Writer
Frenos offers a zero-impact, continuous security assessment platform for operational technology environments. Go to Source Author: Jennifer Lawinski, Contributing Writer
Several versions of PostgreSQL are impacted, and customers will need to upgrade in order to patch. Go to Source Author: Dark Reading Staff
In addition to his prison sentence, he will have to pay more than $1 million in restitution to his victims. Go to Source Author: Dark Reading Staff
As alerts pile up, the complexity can overwhelm security professionals, allowing real threats to be missed. This is where vendors must step up. Go to Source Author: Supradeep Bokkasam
Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks to hijack legitimate domains for using them in phishing attacks and investment fraud schemes for years. The findings come from Infoblox, which said it identified nearly 800,000 vulnerable registered domains over the past three months, of which approximately 9% (70,000) […]
If the government truly wants to protect the US’s most vital assets, it must rethink its cybersecurity policies and prioritize proactive, coordinated, and enforceable measures. Go to Source Author: Jeffrey Wells
Google has revealed that bad actors are leveraging techniques like landing page cloaking to conduct scams by impersonating legitimate sites. “Cloaking is specifically designed to prevent moderation systems and teams from reviewing policy-violating content which enables them to deploy the scam directly to users,” Laurie Richardson, VP and Head of Trust and Safety at Google, […]
