08 Nov

Scattered Spider, BlackCat claw their way back from criminal underground

Two high-profile criminal gangs, Scattered Spider and BlackCat/ALPHV, seemed to disappear into the darkness like their namesakes following a series of splashy digital heists last

Author rabih
08 Nov

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

On October 28th, 2024, the Dutch National police, alongside the FBI, Eurojust, and several other law enforcement organizations, performed a takedown of the infamous RedLine

Author rabih
08 Nov

Winos4.0 abuses gaming apps to infect, control Windows machines

Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.

Author rabih
07 Nov

Don’t open that ‘copyright infringement’ email attachment – it’s an infostealer

Organizations should be on the lookout for bogus copyright infringement emails as they might be the latest ploy by cybercriminals to steal their data. The

Author rabih
07 Nov

Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert. The weakness – dubbed

Author rabih
07 Nov

ESET APT Activity Report Q2 2024–Q3 2024

ESET Research, Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024

Author rabih
07 Nov

Officials warn of Russia’s tech-for-troops deal with North Korea amid Ukraine conflict

The EU has joined US and South Korean officials in expressing concern over a Russian transfer of technology to North Korea in return for military

Author rabih
06 Nov

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

Fresh from a series of serious reports detailing its five-year battle with Chinese cyberattackers, Sophos has dropped a curious story about users of a popular

Author rabih
06 Nov

Operation Synergia II sees Interpol swoop on global cyber crims

Interpol is reporting a big win after a massive combined operation against online criminals made 41 arrests and seized hardware thought to be used for

Author rabih
06 Nov

Jane Goodall: Reasons for hope | Starmus highlights

We Live Science The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems

Author rabih
06 Nov

Cyberattackers stole Microlise staff data following DHL, Serco disruption

Telematics tech biz Microlise says an attack that hit its network likely did not expose customer data, although staff aren’t so lucky. “Some limited employee

Author rabih
06 Nov

China’s Volt Typhoon reportedly breached Singtel in ‘test-run’ for US telecom attacks

Chinese government cyberspies Volt Typhoon reportedly breached Singapore Telecommunications over the summer as part of their ongoing attacks against critical infrastructure operators. The digital break-in

Author rabih
06 Nov

Scumbag puts ‘stolen’ Nokia source code, SSH and RSA keys, more up for sale

IntelBroker, a notorious peddler of stolen data, claims to have pilfered source code, private keys, and other sensitive materials belonging to Nokia. In a post

Author rabih
05 Nov

Schneider Electric ransomware crew demands $125k paid in baguettes

Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data

Author rabih
05 Nov

A Kansas pig butchering: CEO who defrauded bank, church, friends gets 24 years

The FBI has recovered $8 million in funds from a cryptocurrency scam that netted $47 million and devastated the Kansas city of Elkhart. In August,

Author rabih
05 Nov

Criminals open DocuSign’s Envelope API to make BEC special delivery

Business email compromise scammers are trying to up their success rate by using a DocuSign API. The Envelope: create API is designed to let users

Author rabih
05 Nov

Ongoing typosquatting campaign impersonates hundreds of popular npm packages

An ongoing typosquatting campaign is targeting developers via hundreds of popular JavaScript libraries, whose weekly downloads number in the tens of millions, to infect systems

Author rabih
05 Nov

Washington courts grapple with statewide outage after ‘unauthorized activity’

A statewide IT outage attributed to “unauthorized activity” is affecting the availability of services provided by all courts in Washington. The Washington State Administrative Office

Author rabih
Load moreLoadingAll items loaded