❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

ANY.RUN Malware Sandbox Provider’s Employee Email Compromised

By: Alan J
21 June 2024 at 19:33

ANY.RUN

ANY.RUN has disclosed a recent cybersecurity incident in which one of its employees fell victim to a sophisticated phishing attack, potentially compromising sensitive information. ANY.RUN is an online malware analysis environment that helps researchers study and simulate the creation of malware and threat processes in real time. While the full extent of the breach is still under investigation, ANY.RUN affirmed its commitment to transparency and stated that it would provide regular updates on the incident as they work to mitigate potential damage.

ANY.RUN Employee Email Compromise

[caption id="attachment_78600" align="alignnone" width="531"]ANY.RUN Phishing Source: X.com (@anyrun_app)[/caption] According to a post on X from the company's official handle, the attack originated from a compromised customer account, which had been used to send a convincing phishing email to a staff member. This led to unauthorized access to the employee's email account. Subsequently, the attacker forwarded a phishing message to contacts within the compromised email address book. ANY.RUN stated that it had already notified data controllers of affected individuals and is working closely with them to address any concerns. They emphasized that the compromised employee did not have access to the production environment or any code base, which limits the potential scope of the breach.

ANY.RUN Response and Next Steps

Upon discovery of the incident, ANY.RUN took steps to minimize possible compromise and share details about the incident. An ongoing investigation is being done to determine the full impact of the breach and gather additional details. While the comprehensive report, the company has assured its customers that they are taking the matter seriously. In the coming days and weeks, ANY.RUN would work to: 1. Continue their investigation and analysis of the incident 2. Provide regular updates on their progress 3. Compile a detailed report of their findings The company acknowledges that many questions remain unanswered at this stage. However, they are committed to keeping all parties informed throughout the process. Customers appear to have viewed the effort at communication positively, highlighting it as an example of transparency around cybersecurity incident reporting and disclosure. The incident serves as a stark reminder that even companies working in the cybersecurity industry remain a potential target for attacks. Last year, Okta, a provider of identity and access management software, had suffered a security incident in which attackers had managed to access its support incident management through the use of stolen credentials. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess

In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors, with zero-hour Business Email Compromise (BEC) and advanced phishing attacks posing significant risks to organizations. A recent independent study by The Tolly Group, commissioned by SlashNext, highlights the company’s Gen AI powered Integrated Cloud Email Security (ICES) solution, demonstrating its superior […]

The post The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess first appeared on SlashNext.

The post The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess appeared first on Security Boulevard.

Sony removes still-unmet β€œ8K” promise from PS5 packaging

6 June 2024 at 13:00
  • The new PS5 packaging, as seen on the PlayStation Direct online store, is missing the "8K" label in the corner. [credit: PlayStation Direct ]

When we first received our PlayStation 5 review unit from Sony in 2020, we reacted with some bemusement to the "8K" logo on the box and its implied promise of full 7630Γ—4320 resolution output. We then promptly forgot all about it since native 8K content and 8K compatible TVs have remained a relative curiosity thus far in the PS5's lifespan.

But on Wednesday, Digital Foundry's John Linneman discovered that Sony has quietly removed that longstanding 8K label from the PS5 box. The ultra-high-resolution promise no longer appears on the packaging shown on Sony's official PlayStation Direct store, a change that appears to have happened between late January and mid-February, according to Internet Archive captures of the store page (the old "8K" box can still be seen at other online retailers, though).

A promise deferred

This packaging change has been a long time coming since the PS5 hasn't technically been living up to its 8K promise for years now. While Sony's Mark Cerny mentioned the then-upcoming hardware's 8K support in a 2019 interview, the system eventually launched with a pretty big "coming soon" caveat for that feature. "PS5 is compatible with 8K displays at launch, and after a future system software update will be able to output resolutions up to 8K when content is available, with supported software," the company said in an FAQ surrounding the console's 2020 launch.

Read 3 remaining paragraphs | Comments

Understanding Business Email Compromise (BEC)

31 May 2024 at 18:34

What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC is highly targeted and often involves impersonating a trusted individual or entity to trick employees into transferring funds or divulging sensitive […]

The post Understanding Business Email Compromise (BEC) first appeared on SlashNext.

The post Understanding Business Email Compromise (BEC) appeared first on Security Boulevard.

❌
❌