Infosecurity News

Christmas Payroll Fears After Ransomware Hits Software Provider
UKG suffered attack impacting its Kronos Private Cloud last week

Police Arrest Suspected Ransomware Actor in Romania
Individual targeted IT company for sensitive client data

CSAM Found on LSU Professor’s Computer
Cops called after IT department discovers files with “names that alarmed them”

SANS Opens Free Holiday Hack Challenge
Cybersecurity training institute invites world to help Santa defeat cyber-villains

Hackers Target India’s Prime Minister
Prime Minister Modi’s Twitter account hacked to spread fake Bitcoin message

Ex-NFL Star Gets Three Years for #COVID19 Fraud
Joshua Bellamy falsified information about his company

“Sadistic” Online Extortionist Jailed for 32 Years
Birmingham man forced some victims to the point of suicide

“Worst-Case Scenario” Log4j Exploits Travel the Globe
Log4j vulnerability affects huge sweep of applications and vendors

Cyber-Attack on Hellmann Worldwide Logistics
German logistics firm unable to rule out data leakages or unauthorized use of data

HSE Missed Cyber-Attack’s Warning Signs
Criminals inside Irish health service’s network for two months before ransomware attack

Volvo Hit by Cyber-Thieves
Research and development data stolen from carmaker in cyber-attack

UK Court Paves Way for Julian Assange’s Extradition to the US
A UK court has ruled that the Wikileaks founder can be extradited to the US to face trial over leaking classified documents

Experts Meet to Share Info on Crypto Crimes
Over 2000 join effort to fight money laundering and other offenses

Crypting Mastermind Gets Just Two Years for Kelihos Plot
Russian national was facing a maximum possible sentence of 15 years

Three-Quarters of Firms Admit Sub-Optimal IoT Security
Connected device projects soar during pandemic

Verdict Reached in Josh Duggar Case
Reality TV star found guilty of child sexual abuse material charges

DARPA Announces SMOKE Program
US military researchers ask cybersecurity industry to model hackers’ signature moves

Most Phishing Pages are Short-lived
The majority of phishing pages exist for only one day

Half of Websites Still Using Legacy Crypto Keys
Scott Helme urges firms to switch from RSA to ECDSA

NVD: It’s Another Record Year for Vulnerabilities
Fifth year in a row for record number of bugs published to National Vulnerability Database



