mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

918
active users

Learn more

#blackbyte

0 posts0 participants0 posts today
securityaffairs<p><a href="https://infosec.exchange/tags/BlackByte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlackByte</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> group targets recently patched <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> ESXi flaw CVE-2024-37085<br><a href="https://securityaffairs.com/167695/malware/blackbyte-ransomware-vmware-esxi-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167695/mal</span><span class="invisible">ware/blackbyte-ransomware-vmware-esxi-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a><br>@TalosSecurity</p>
Redhotcyber<p>Attacco informatico alla Yamaha. La cybergang BlackByte pubblica i primi samples</p><p>La banda di <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> di <a href="https://mastodon.bida.im/tags/BlackByte" class="mention hashtag" rel="tag">#<span>BlackByte</span></a>, rivendica all’interno del proprio Data Leak Site (<a href="https://mastodon.bida.im/tags/DLS" class="mention hashtag" rel="tag">#<span>DLS</span></a>) un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a> al colosso <a href="https://mastodon.bida.im/tags/Yamaha" class="mention hashtag" rel="tag">#<span>Yamaha</span></a>.</p><p>I <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>, come sappiamo, sono <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> che criptano i file <a href="https://mastodon.bida.im/tags/sensibili" class="mention hashtag" rel="tag">#<span>sensibili</span></a> dell’utente o dell’azienda, rendendoli inaccessibili fino al pagamento di un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>. Questo tipo di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> è spietato e priva le vittime dell’accesso ai propri <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> critici, costringendole a fare scelte difficili tra la perdita dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> o il pagamento dei <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/</span></a></p>
securityaffairs<p>Is the <a href="https://infosec.exchange/tags/BlackByte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlackByte</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> gang behind the City of <a href="https://infosec.exchange/tags/Augusta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Augusta</span></a> attack?<br><a href="https://securityaffairs.com/146717/cyber-crime/city-of-augusta-cyberattack.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/146717/cyb</span><span class="invisible">er-crime/city-of-augusta-cyberattack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Julien<p>🏴‍☠️💰 Record broken on January 16 with 12 <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> victims announced from <a href="https://infosec.exchange/tags/Hive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hive</span></a> <a href="https://infosec.exchange/tags/Blackbyte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blackbyte</span></a> <a href="https://infosec.exchange/tags/Royal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Royal</span></a> (x2) <a href="https://infosec.exchange/tags/ViceSociety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ViceSociety</span></a> <a href="https://infosec.exchange/tags/lockbit3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lockbit3</span></a> (x5) <a href="https://infosec.exchange/tags/Mallox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mallox</span></a> and <a href="https://infosec.exchange/tags/Play" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Play</span></a> groups </p><p>🔗 Source : <a href="https://www.ransomware.live" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">ransomware.live</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/Leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Leak</span></a></p>