Acuant is based in California and it specializes in identity verification and Know Your Customer (KYC) and Anti-Money Laundering (AML) compliance. The acquisition, which is expected to close by the end of the month, will help GBG further expand into the United States. GBG says Acuant’s product suite complements the services provided by its US-based…

Emotet, which emerged in 2014, became one of the most prevalent threats of the decade, evolving into a malware downloader that allowed cybercriminals to disseminate malware such as TrickBot, the Ryuk ransomware, and the QakBot banking Trojan, as well as various other threats. In January 2021, law enforcement agencies announced they were able to take…

A data breach can destroy a business. For small- and medium-sized businesses (SMB), this is really especially concerning, as 60% will shut down within six months of the attack. While larger companies and agencies likely won’t have to shut their doors, they, too, suffer serious consequences. There are financial costs, which Ponemon Institute and IBM…

Attackers are actively exploiting an “old” vulnerability (CVE-2021-22205) to take over on-premise GitLab servers, Rapid7 researcher Jacob Baines warns. The additional bad news is that at least half of the 60,000 internet-facing GitLab installations the company detects are not patched against this issue. What are the attackers doing with these servers? Damian Menscher, a security…

Ransomware actors are known for performing extensive research prior to launching an attack on victims, using publicly available information, along with material non-public data. Should the victim refrain from paying the ransom, the attackers threaten to disclose the gathered information publicly, thus attempting to extort the victim, the FBI warned. “Ransomware actors are targeting companies…

Tuesday’s attack “technically” resembles two previous incidents whose perpetrators “were unquestionably our enemies, namely the United States and the Zionist regime”, the Revolutionary Guards’ Gholamreza Jalali said. “We have analysed two incidents, the railway accident and the Shahid Rajaei port accident, and we found that they were similar,” Jalali, who heads a civil defence unit…

“If we have 1 Millions $ in our wallet in the next 48 hours, we will not leak this information and also we will not sell it to anybody,” Black Shadow wrote on Telegram. The Atraf dating site was compromised after the group hacked CyberServe, an Israeli internet service provider whose clients include public transportation…

Seemingly every day, a new organization announces they’ve been hit by a ransomware attack. The agnostic nature of ransomware leaves no industry immune to vulnerabilities. Be it school systems, healthcare providers, or government agencies, the battlegrounds are increasingly widespread. Companies should operate not on a basis of if they’ll be hit, but when. Executives and…