Beef Supplier JBS Paid Hackers $11 Million Ransom After Cyberattack – Tempemail

Meat processing company JBS on Wednesday confirmed it paid extortionists $11 million in bitcoins to regain access to its systems following a destructive ransomware attack late last month. “In consultation with internal IT professionals and third-party cybersecurity experts, the company made the decision to mitigate any unforeseen issues related to Continue Reading

U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers – Tempemail

In a major blow, the U.S. Department of Justice on Monday said it has recovered 63.7 bitcoins (currently valued at $2.3 million) paid by Colonial Pipeline to the DarkSide ransomware extortionists on May 8, pursuant to a seizure warrant that was authorized by the Northern District of California. The ransomware Continue Reading

Air India Hack Exposes Credit Card and Passport Info of 4.5 Million Passengers – Tempemail

India’s flag carrier airline, Air India, has disclosed a data breach affecting 4.5 million of its customers over a period stretching nearly 10 years after its Passenger Service System (PSS) provider SITA fell victim to a cyber attack earlier this year. The breach involves personal data registered between Aug. 26, Continue Reading

Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom – Tempemail

U.S. insurance giant CNA Financial reportedly paid $40 million to a ransomware gang to recover access to its systems following an attack in March, making it one the most expensive ransoms paid to date. The development was first reported by Bloomberg, citing “people with knowledge of the attack.” The adversary Continue Reading

DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months – Tempemail

DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups. “In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47 Continue Reading

Colonial Pipeline Paid Nearly $5 Million in Ransom to Cybercriminals – Tempemail

Colonial Pipeline on Thursday restored operations to its entire pipeline system nearly a week following a ransomware infection targeting its IT systems, forcing it to reportedly shell out nearly $5 million to restore control of its computer networks. “Following this restart, it will take several days for the product delivery Continue Reading

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys – Tempemail

Most mobile app users tend to blindly trust that the apps they download from app stores are safe and secure. But that isn’t always the case. To demonstrate the pitfalls and identify vulnerabilities on a large scale, cybersecurity and machine intelligence company CloudSEK recently provided a platform called BeVigil where Continue Reading

3.2 Billion Leaked Passwords Contain 1.5 Million Records with Government Emails – Tempemail

A staggering number of 3.28 billion passwords linked to 2.18 billion unique email addresses were exposed in what’s one of the largest data dumps of breached usernames and passwords. In addition, the leak includes 1,502,909 passwords associated with email addresses from government domains across the world, with the U.S. government Continue Reading

Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid – Tempemail

Prominent Apple supplier Quanta on Wednesday said it suffered a ransomware attack from the REvil ransomware group, which is now demanding the iPhone maker pay a ransom of $50 million to prevent leaking sensitive files on the dark web. In a post shared on its deep web “Happy Blog” portal, Continue Reading

New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices – Tempemail

Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system. Dubbed “NAME:WRECK” by Forescout and JSOF, the flaws are the latest in series of studies undertaken as Continue Reading