Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

New Cactus Ransomware Uses Encrypted 7-Zip to Get Around Detection

Ransomware is a pain in the ass, no matter what type it is. You have a piece of code that comes in, encrypts all your files, steals them and then you must deal with paying a ransom of some sort to either get your files back or prevent potential disclosure of sensitive information. It is not exactly what you want to deal with on a given day. So, when a new method of deploying ransomware pops up you can excuse our thinking “oh what fresh hell is this”.

Details
By Sean Kalinich
Sean Kalinich
May 08
Hits: 1524
  • Hacking
  • Malware
  • Ransomware
  • mdr
  • edr
  • cactus

Read more: New Cactus Ransomware Uses Encrypted 7-Zip to...

No comments on “New Cactus Ransomware Uses Encrypted 7-Zip to Get Around Detection”
News

Try2Check Dismantled by Authorities, $10M Reward Posted for its Creator

There you are doing your stollen credit card number shopping, like you do every Sunday. You come across a big batch of them, and the deal seems good. How do you know these things are real? I mean this isn’t exactly Amazon with reviews and a return policy. This is a dark web marketplace. The answer to your dilemma is to use a card checking service. One of, if not the, most popular services on the darker side of the web was Try2Check. I say was since this system was taken down by the US Government this week in what has been described as a multi-national operation.

Details
By Sean Kalinich
Sean Kalinich
May 05
Hits: 758
  • Hacking
  • try2check
  • denis kulkov
  • cybercrime
  • credit card data
  • darkweb

Read more: Try2Check Dismantled by Authorities, $10M Reward...

No comments on “Try2Check Dismantled by Authorities, $10M Reward Posted for its Creator”
News

Double DLL Sideloading, it’s a Thing as Attackers Grow More Sophisticated

DLL sideloading is a common technique for attackers to use when getting their malware in place and has been in use since around 2010. Simply put your malicious DLL in the same directory as the application and Windows in all its helpfulness loads it first instead of the legitimate one that might be in another directory. This method is also referred to as DLL search order hijacking. With the age of this technique and advances in EDR/MDR its usefulness has decreased.

Details
By Sean Kalinich
Sean Kalinich
May 04
Hits: 907
  • Hacking
  • APT
  • Attacks
  • threat groups
  • dll search order hijacking
  • dll sideloading
  • advanced persistent threat
  • aptq27

Read more: Double DLL Sideloading, it’s a Thing as...

No comments on “Double DLL Sideloading, it’s a Thing as Attackers Grow More Sophisticated”
News

Level Finance Crypto Finds Out Passing an Audit is not Security the Hard Way

There is an old adage that says compliance is not a substitute for security. You can check all the compliance check boxes, pass audits, and still end up with an insecure environment. Level Finance Crypto found this out the hard way after they were hacked due to a vulnerability in how some of their smart contracts were set up, despite passing more than one IT Security Audit.

Details
By Sean Kalinich
Sean Kalinich
May 03
Hits: 603
  • Vulnerabilities
  • Vulnerability Management
  • cryptocurrency
  • level finance crypto
  • dao
  • alternative investments
  • security audit

Read more: Level Finance Crypto Finds Out Passing an Audit...

No comments on “Level Finance Crypto Finds Out Passing an Audit is not Security the Hard Way”
News

ChatGPT Might get a Private Option for Business According to Microsoft

A recent incident where ChatGPT users at Samsung unknowingly exposed sensitive data via ChatGPT has raised concerns in multiple industries. The banking and finance industry saw several companies put a stop on the use of ChatGPT and certain regulators began investigating how its use could leak PII, or other financial information. To combat this new obstacle to business adoption, Microsoft is looking to offer a private business model which would exclude user input from being used to train the LLM.

Details
By Sean Kalinich
Sean Kalinich
May 03
Hits: 2736
  • Security
  • Microsoft
  • Automation
  • data leak
  • regulation
  • chatgpt
  • openai

Read more: ChatGPT Might get a Private Option for Business...

No comments on “ChatGPT Might get a Private Option for Business According to Microsoft”

More Articles …

  1. T-Mobile’s History of Data Breaches Comes up as the Second Breach of 2023 is Announced
  2. Over Regulation and the Laws of Diminishing Returns in Cybersecurity
  3. Dell and others move to disable Intel's Management Engine
  4. No, The Jayden K Smith Facebook Message is not real...
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

Page 17 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech