Despite some concerns within the web3 community about the Federal Reserve’s understanding of the evolving digital landscape, recent evidence suggests that these fears may be unfounded. The Fed has been diligently studying the intricacies of the web3 ecosystem and the technology underpinning it. As the central bank formulates its perspectives on stablecoins, central bank digital […]
The post The Fed and web3: Understanding the U.S. central banking system’s approach to all things crypto appeared first on CryptoSlate.
Nexusflow, a startup using generative AI to help companies make sense of cybersecurity data, today announced that it raised $10.5 million in a seed round led by Point72 Ventures with participation from Fusion Fund and several AI luminaries in Silicon V…
Cisco, a prominent player in the world of networking and cybersecurity, has issued a critical security advisory concerning multiple vulnerabilities in their Catalyst SD-WAN Manager, formerly known as Cisco SD-WAN vManage. These vulnerabilities co…
The Snatch Ransomware group is considered dangerous due to its advanced techniques and ability to evade detection. Security systems find it difficult to identify and stop such assaults since they use techniques like file encryption and memory inj…
A U.S. security researcher is warning of a chilling effect after he was detained on arrival at a U.S. airport, his phone was searched, and was ordered to testify to a grand jury, only to have prosecutors reverse course and drop the investigation later….
The alleged Sony data breach just got messier. On Monday, relatively new hacking group Ransomed.vc made the lofty claim that it had successfully compromised “all” of the company’s systems, as reported by Cybersecurity Connect. Now a second threat actor has leaked the data believed to be in Ransomed.vc‘s possession, claiming the former are “scammers” trying to “chase influence.” How either group obtained this data, or the extent of the breach, remain unknown but Sony has confirmed to Engadget it’s investigating the situation.
Ransomed.vc said it wouldn’t ransom Sony, and instead would be selling the data “due to Sony not wanting to pay.” It posted a sampling of files as “proof” of their claims. Ransomed.vc gave a deadline of September 28. On Tuesday, a threat actor under the name “MajorNelson,” claimed that Ransomed.vc lied about the breach, and leaked the data that Ransomed.vc claimed to have, according to malware repository vx-underground. Engadget could not independently verify the claims.
“We are currently investigating the situation,” a Sony spokesperson told Engadget.Â
Ransomed.vc emerged as attackers and a ransomware-as-a-service organization that lets others pay to launch attacks. The group threatens victims with data protection fines under laws like the GDPR if they do not pay the ransom. In other words, pay us a few hundred thousand dollar ransom, or we’ll report you to pay up a million dollar fine. MajorNelson appears to be an independent threat actor motivated by a disdain for Ransomed.vc, calling the reports about their efforts lies.
“RansomedVCs are scammers who are just trying to scam you and chase influence,” MajorNelson wrote. “Enjoy the leak.” According to MajorNelson, the leak includes credentials for internal systems, incident response policies and more.Â
In 2011, a threat actor exposed personally identifiable information from 77 million PlayStation network accounts. Sony took the network offline for 23 days as it mitigated the damage, and in 2019, it agreed to pay a £250K fine in the UK for its failure to adequately prepare for the attack.Â
This article originally appeared on Engadget at https://www.engadget.com/sony-investigates-the-alleged-data-breach-that-has-led-to-hacker-infighting-161559960.html?src=rss
A company that acquires and sells zero-day exploits — flaws in software that are unknown to the affected developer — is now offering to pay researchers $20 million for hacking tools that would allow its customers to hack iPhones and Android devices. On…