Content Paint

Author Info

Full Name

Nick Valentine

Location

Chicago, IL

Nick Valentine's Work

382 Posts
Nick Valentine
“CP3O” Pleads Guilty to Cryptomining Scheme

Charles O Parks III, known online as "CP3O," has pleaded guilty to orchestrating a cryptomining fraud using stolen cloud computing resources valued at more than $3.5 million. The 45-year-old faces up to 20 years in prison for wire fraud. Operation Timeframe: Parks conducted his scheme over eight

Microsoft December 2024 Patch Tuesday addressed actively exploited zero-day

Microsoft Bolsters Security with December 2024 Patch Tuesday Fixes In its December 2024 Patch Tuesday release, Microsoft has addressed 71 security vulnerabilities across a range of products, including Windows, Office, SharePoint Server, and more. This patch includes a critical fix for an actively exploited zero-day vulnerability. Total Addressed: 71 vulnerabilities

Ransomware Hits Leading Heart Surgery Biomedical Device Manufacturer

Artivion, a prominent manufacturer of heart surgery devices, announced a ransomware attack on November 21, which disrupted some of its operations and led to the deactivation of certain systems. Company Overview Based in Atlanta, Georgia, Artivion employs over 1,250 individuals globally, with sales operations spanning more than 100 countries.

Romanian energy supplier Electrica hit by ransomware attack

Electrica Group, a major entity in Romania's electricity distribution sector, is currently grappling with a ransomware attack. The incident, which remains active, could impact the company's extensive customer base spanning across Transilvania and Muntenia. Company Overview Electrica, founded as part of the National Electricity Company in

Using QR Codes to Bypass Browser Isolation

A New Threat to Browser Isolation Security Recent research exposes a method for compromising browser isolation using QR codes, potentially facilitating malicious communication with infected devices. Research Team Experts at Mandiant have unveiled a technique that subverts browser isolation—whether remote, on-premises, or local—by using QR codes to transmit

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

The criminal group behind Black Basta ransomware has recently incorporated new social engineering strategies, deploying malicious payloads including Zbot and DarkGate since October 2024. This evolution indicates a more sophisticated approach in their methods of attack. Key Tactics and Techniques Email Bombing: Black Basta initiates their attacks by overwhelming target

Criminals Impersonating Police Arrested in Multi-Million Euro Phishing Scam

A sophisticated phishing network that posed as law enforcement and banking officials to defraud elderly victims throughout Europe has been successfully dismantled by Belgian and Dutch police, with Europol’s crucial assistance. #### Operative Details Scam Tactics Operating primarily from the Netherlands, the fraudsters orchestrated a complex scheme utilizing both phone

$50 Million Crypto Heist Linked to North Korean Hackers

Radiant Capital has attributed a $50 million cryptocurrency theft to North Korean hackers following an October 16 security breach. This investigation, supported by cybersecurity firm Mandiant, links the attack to a group known as Citrine Sleet, also referred to as UNC4736 or "AppleJeus," which is reportedly affiliated with

AI Library Compromised to Deliver Cryptocurrency Miner via PyPI

A recent cybersecurity investigation has uncovered that the ultralytics AI library was compromised, resulting in the distribution of a cryptocurrency mining program. Compromise Details According to ReversingLabs, the breach stemmed from a vulnerable GitHub Actions script within the library’s build environment. This particular vulnerability allowed attackers to inject malicious

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.