Secjuice Squeeze Volume 46

Welcome to the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.

Secjuice Squeeze Volume 46

Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week. This week's volume was curated by Secjuice writers Prasanna, Sinwindie, and Muhammad Luqman.

Articles

Here’s what happens after a business gets hit with ransomware

What happens when a company has to recover from a ransomware attack? Intel 471 talked to a CIO who went through the painstaking process.

Source & Link: intel471.com
Curator: Prasanna

Secret Amazon Reports Expose Company Spying on Labor, Environmental Groups

Leaked documents reveal Amazon's reliance on Pinkerton operatives to spy on workers and its extensive monitoring of labor unions and social movements.

Source & Link: vice.com
Curator: Prasanna

Sopra Steria expects €50 million loss after Ryuk ransomware attack

French IT services giant Sopra Steria said today in an official statement that the October Ryuk ransomware attack will lead to a loss of between €40 million and €50 million.

Source & Link: bleepingcomputer.com
Curator: Prasanna

North Korean hackers suspected of targeting vaccine maker AstraZeneca in cyberattack

North Korean hackers are suspected to have carried out a cyberattack against British coronavirus vaccine developer AstraZeneca in recent weeks, Reuters revealed Friday, citing two unnamed sources with knowledge of the matter.

Source & Link: cnn.com
Curator: Sinwindie

Hacker posts exploits for over 49,000 vulnerable Fortinet VPNs

A hacker has posted a list of one-line exploits to steal VPN credentials from almost 50,000 Fortinet VPN devices.

Source & Link: bleepingcomputer.com
Curator: Muhammad Luqman

Upcoming Events, Webcasts, Conferences, etc.

BIG List of Virtual Cybersecurity Conferences

Source & Link: https://github.com/santosomar/virtualseccons
Curator: Guise Bule

FBI fingerprint file room in 1944. By 1946, the FBI had processed over 100 million fingerprint cards in files maintained manually. In 1947, the FBI's fingerprint repository was moved from the Washington DC Armory Building to a new building at 2nd and D Streets Southwest in Washington, DC. Source Unknown.