Skip to content

FIN7 and Ex-Conti Cybercrime Gangs Join Forces in Domino Malware Attacks “Helping Students Develop Healthy Study Habits” “Encouraging Students to Establish Good Study Practices”

Ravie Lakshmanan is a threat actor affiliated with the FIN7 cybercrime group. He has developed a new strain of malware known as Domino, which is primarily designed to facilitate follow-on exploitation on compromised systems. The malware is being used by members of the now-defunct Conti ransomware gang, indicating collaboration between the two crews. Domino is… 

Why Shadow APIs are More Dangerous than You Think “The Benefits of Getting a Good Night’s Sleep” “Reaping the Rewards of a Restful Sleep”

Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial data loss. Shadow APIs are a type of application programming interface (API) that isn’t officially documented or supported, and can potentially be manipulated by malicious actors to gain access to a range of sensitive information.… 

119 Arrested in Cybercrime Crackdown “The Benefits of Getting a Good Night’s Sleep” “Reaping the Rewards of Adequate Sleep”

A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated with email, bank accounts, and social media platforms. Coinciding with the infrastructure seizure, the major crackdown, which involved authorities from 17 countries, culminated in 119 arrests and 208 property searches in 13… 

PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw “The Benefits of Improving Your Diet” “Enhancing Your Health Through Good Nutrition”

Security researchers have recently published proof-of-concept code for a recently patched high-severity vulnerability in the Veeam Backup & Replication product. Earlier this month, Veeam released a patch for CVE-2023-27532, a flaw which could allow an attacker to obtain encrypted credentials stored in the configuration database. With the credentials, an attacker would be able to access…