Breaking News

•••  All important news related to new attacks and see the solutions we can offer you  •••


Poland's CD Projekt delays results due to cyber attack

Read the original article here
Cyber Defense

WARSAW (Reuters) - Polish video games maker CD Projekt posptoned the publication of its financial results for 2020 and the first quarter of 2021 as a result of a cyber attack that resulted in restricted access to its systems, the company said on Friday.

The cyber attack earlier this month compromised some of CD Projekt’s internal systems, including the source code to Cyberpunk 2077 and resulted in delaying the release of a patch for the game until the second half of March.

The company said on Friday it had moved the date of publication of its 2020 results to April 19 from March 30. The results for the first quarter of 2021 will be published on May 27, two days later than initially planned.

Shares in the company, which rose to fame on the back of the success of its medieval fantasy Witcher series, plunged at the end of last year due to Cyberpunk roll-out problems, after hitting a record high of 464.2 zlotys. They recovered some losses after a social media campaign against short sellers led some to close their positions.

Shares have lost almost 10% since the postponement of Cyberpunk’s patch earlier this week.

Contact us and together we will protect your organization

Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites

Read the original article here
Cyber Defense

A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads.

"The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft," Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today.

"In recent years, almost as much effort has gone into improvement of its delivery method as has gone into the NodeJS-based malware itself."

Dubbed "Gootloader," the expanded malware delivery system comes amid a surge in the number of infections targeting users in France, Germany, South Korea, and the U.S.

Ask our experts how to protect your organization and your clients

Web Application Attacks Grow Reliant on Automated Tools

Read the original article here
Cyber Defense

Cybercriminals targeting Web applications have grown more reliant on automated tools in their attacks, report Barracuda Networks researchers who analyzed two months of attack data. 

The top five threat types were dominated by attacks deployed using automated tools, they found. Fuzzing attacks (19.46%) were most prevalent, followed by injection attacks (12.07%), fake bots (12.02%), application distributed denial-of-service (9.29%), and blocked bots (1.2%). 

Automated attacks rely on bots to exploit vulnerabilities in Web applications, and there are two classes of attackers who use them. The larger amount of traffic comes from attackers who don't try to target a specific website but deploy automated attacks at scale. Another, smaller group uses automated tools to target e-commerce websites and other sites to generate a profit. 

These threats may take the form of fake bots posing as Google bots to avoid detection, or they could manifest as app DDoS attacks trying to crash a website by quietly overloading a Web app. Most attack traffic came from fuzzing, or reconnaissance, tools used to probe apps for bugs. 

Do you want to counter the attackers with state of the art automated solutions? Cert2Connect offers various solutions that will enable you Blue team to think and work offensive ! 

See Cert2Connect purple team
Load more