Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper MalwareA version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities...
Day: December 6, 2022
Data Breaches: What They Are, Why They Occur, and How to Prevent Them
Data Breaches: What They Are, Why They Occur, and How to Prevent ThemData breaches are invaluable to understanding a threat actor’s goals and motivations. Often fueled...
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired Woman
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired WomanAn iPhone owner sent the asset protection forces of America...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportMeta outlines US involvement in social media disinformation in new report A report released by Meta’s...
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS)
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) The news of the All India Institute of Medical Sciences (AIIMS) servers being breached is...
Decentralized Cyber security – An Advanced Approach
Decentralized Cyber security – An Advanced ApproachINTRODUCTION Security is getting harder to centralize as the nature of remote work changes and more businesses abandon the physical...
International police operation takes down iSpoof
International police operation takes down iSpoof Last week, an international group of law enforcement agencies took down one of the biggest criminal operators of a spoofing-as-a-service...
Gunfire at electrical grid kills power for 45,000 in North Carolina
Gunfire at electrical grid kills power for 45,000 in North CarolinaYou don't have to be a coder to cut off the juice when blunt tools are...
Four suspects cuffed, face extradition over tax refund scam plot
Four suspects cuffed, face extradition over tax refund scam plotRDP servers allegedly raided in hunt for personal info to exploit Four men suspected of plotting to...
TSA to expand facial recognition across America
TSA to expand facial recognition across AmericaSystem is optional, for the moment America's Transport Security Administration, better known as the TSA, has been testing facial recognition...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportA report released by Meta’s security team describes the company’s shutdown of a network of Facebook...
Palo Alto Networks looks to shore up healthcare IoT security
Palo Alto Networks looks to shore up healthcare IoT securityPalo Alto Networks today rolled out a new Medical IoT Security offering, designed to provide improved visibility,...
Prolific Chinese Hackers Stole US COVID funds
Prolific Chinese Hackers Stole US COVID fundsSecret Service says discovery may be the tip of the icebergLeer másSecret Service says discovery may be the tip of...
Russian Hackers Use Western Networks to Attack Ukraine
Russian Hackers Use Western Networks to Attack UkraineLupovis used decoys to find out more about threat actorsLeer másLupovis used decoys to find out more about threat...
Crook sentenced to 18 months for stealing $20M in SIM swapping attack
Crook sentenced to 18 months for stealing $20M in SIM swapping attackNicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more...
FreeBSD Systems Exposed to Compromise Due to Ping Vulnerability
FreeBSD Systems Exposed to Compromise Due to Ping VulnerabilityThe creators of the FreeBSD operating system have released updates meant to resolve a vulnerability within the ping...
French Hospital Forced to Transfer Patients After Ransomware Attack
French Hospital Forced to Transfer Patients After Ransomware AttackA Saturday night ransomware attack forced the André-Mignot teaching hospital in the Paris outskirts to shut down its...
Hacking cars remotely with just their VIN
Hacking cars remotely with just their VINYour car's mobile app might have allowed hackers to remotely unlock your vehicle, turn on or off its engine, and...
Russian courts attacked by CryWiper malware that poses as ransomware
Russian courts attacked by CryWiper malware that poses as ransomwareRussian courts and government agencies have been hit by a previously-undocumented strain of data-wiping malware known as...
Microsoft warns of Russian cyberattacks throughout the winter
Microsoft warns of Russian cyberattacks throughout the winterMicrosoft has warned of Russian-sponsored cyberattacks continuing to target Ukrainian infrastructure and NATO allies in Europe throughout the winter. [...]Leer...
Snyk’s Iain Rose on How to Secure Cloud-Native Environments
Snyk's Iain Rose on How to Secure Cloud-Native EnvironmentsRose on Why Apps and Dev Workflows Must Embrace the Cloud's Rapid Rate of ChangeOrganizations should build apps...
Certificados para Android usados para firmar malware
Certificados para Android usados para firmar malwareTodas las apps de Android están firmadas por un certificado. Pero esto no garantiza su identidad, sino su integridad. En...