article thumbnail

How 'Mespinoza' Ransomware Group Hits Targets

Data Breach Today

Palo Alto Networks Report Describes Tactics of Group Leveraging Open-Source Tools The gang behind the ransomware strain known as Mespinoza, aka PYSA, is targeting manufacturers, schools and others, mainly in the U.S. million, according to Palo Alto Networks' Unit 42, which says the group leverages open-source tools.

article thumbnail

Police in Europe Arrest 31 for Hacking and Stealing Autos

Data Breach Today

Keyless Auto Theft Mounting Threat for Car Owners A European ring of auto thieves used software branded as a diagnostic tool to make fobless thefts of cars made by two French manufacturers. It looks like the thieves found a vulnerability in the electronic control unit governing the authorization of new key fobs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TIDRONE APT targets drone manufacturers in Taiwan

Security Affairs

Trend Micro spotted an allegedly China-linked threat actor, tracked TIDRONE, targeting drone manufacturers in Taiwan. Since April, the group used CLNTEND , a previously undetected remote access tool (RAT), which supports a wider range of network protocols for communication, further enhancing their capabilities.

article thumbnail

New LookingGlass CEO Bryan Ware to Diversify Customer Base

Data Breach Today

New Attack Surface Management Tool Should Help Reach New Clients New CEO Bryan Ware plans to leverage LookingGlass' nascent attack surface management capabilities to capture clients in verticals such as pharmaceuticals, manufacturing and utilities.

article thumbnail

2021 State of Analytics: Why Users Demand Better

The sample included 1,931 knowledge workers, or end users, from financial services, healthcare, and manufacturing who are familiar with the analytics tools within their applications.

article thumbnail

NEW TECH: Semperis introduces tools to improve security resiliency of Windows Active Directory

The Last Watchdog

In many cases, the lateral movement phase is being facilitated by the hijacking of an ubiquitous network administrator’s tool: Windows Active Directory, or AD. Once inside a network, they move laterally to locate and encrypt mission-critical systems; a ransom demand for a decryption key follows. but all across the world,” Bresman told me.

article thumbnail

Token Snags Ex-OneSpan Revenue Leader John Gunn as New CEO

Data Breach Today

Gunn is tasked with sourcing the critical components needed to manufacture the ring and building a base of paying clients for the biometric tool.

article thumbnail

Deliver Mission Critical Insights in Real Time with Data & Analytics

In the fast-moving manufacturing sector, delivering mission-critical data insights to empower your end users or customers can be a challenge. Traditional BI tools can be cumbersome and difficult to integrate - but it doesn't have to be this way.