Police remove skimmer from Piggly-Wiggly on Battle Street | News | annistonstar.com

A skimmer is an electronic device that is used to steal credit or debit card information, including PIN numbers, while the victim is making a legitimate transaction.

Online scams easy as ever, as cybercrime markets flourish

Cybercriminals are often portrayed in popular media as rogue and highly skilled individuals, wielding coding and hacking abilities from a dimly lit room. But such stereotypes are becoming outdated. 

Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google | Tom’s Hardware

A number of apartment complexes using internet-connected intercom/entry systems still use their default credentials, which make them fully accessible to anyone savvy enough to Google their unit’s manual.

US Coast Guard paychecks delayed by cyberattack | TechRadar

A data breach has affected the personnel and payroll systems of the US Coast Guard, and has impacted member pay, and forced the agency to to take systems offline to prevent further intrusion until “at least February 19th, 2025”.

Researchers unearth two previously unknown Linux backdoors – Help Net Security

These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection.

Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day

This 0-day flaw, identified by security analysts at ClearSky Cyber Security in June 2024, allows attackers to gain unauthorized access to systems through minimal user interaction.

Schneider Electric hit by Ransomware Demand of $125,000 in baguettes.

Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data — and demanded the French multinational energy management company pay $125,000 in baguettes or else see its sensitive customer and operational information leaked.

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop

Company officials say the individual was caught during the onboarding process, but used proxies and verified documents to back up their legend.

Russian group’s hack of Texas water system underscores critical OT cyber threats | CSO Online

But water systems have been increasingly in the crosshairs in 2024, resulting in the following noteworthy water security developments:

JPCERT shares Windows Event Log tips to detect ransomware attacks

The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.