Universities and colleges cope silently with ransomware attacksAlthough some cybersecurity researchers say that ransomware attacks are on the downswing as cybercriminals face declining payments, a spate...
MI5 Launches New Agency to Tackle State-Backed Attacks
MI5 Launches New Agency to Tackle State-Backed AttacksNational Protective Security Authority begins its workRead MoreNational Protective Security Authority begins its work
UK Crypto Firm Loses $200m in Cyber-Attack
UK Crypto Firm Loses $200m in Cyber-AttackEuler Finance suffered "flash loan" attackRead MoreEuler Finance suffered "flash loan" attack
LA Housing Authority Suffers Year-Long Breach
LA Housing Authority Suffers Year-Long BreachLockBit ransomware group stole data and encrypted filesRead MoreLockBit ransomware group stole data and encrypted files
CISA Creates New Ransomware Vulnerability Warning Program
CISA Creates New Ransomware Vulnerability Warning ProgramThe Agency will warn critical infrastructure entities to enable mitigation before an incidentRead MoreThe Agency will warn critical infrastructure entities...
DEV-1101 Updates Open Source Phishing Kit
DEV-1101 Updates Open Source Phishing KitThe kit is written in NodeJS and has automated setup and detection evasion capabilitiesRead MoreThe kit is written in NodeJS and...
YoroTrooper Espionage Campaigns Target CIS, EU Countries
YoroTrooper Espionage Campaigns Target CIS, EU CountriesThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan and KyrgyzstanRead MoreThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan...
Dissecting the malicious arsenal of the Makop ransomware gang
Dissecting the malicious arsenal of the Makop ransomware gangCyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from...
Advanced actor targets Fortinet FortiOS in attacks on govt entities
Advanced actor targets Fortinet FortiOS in attacks on govt entitiesAn unknown threat actor is targeting Government entities and large organizations by exploiting a security flaw in...
DEV-1101 AiTM phishing kit is fueling large-scale phishing campaigns
DEV-1101 AiTM phishing kit is fueling large-scale phishing campaignsMicrosoft warns of large-scale phishing attacks orchestrated with an open-source adversary-in-the-middle (AiTM) phishing kit available in the cybercrime...
$197 Million in Cryptocurrency Stolen in Euler Finance Attack
$197 Million in Cryptocurrency Stolen in Euler Finance AttackOn Sunday, a cryptocurrency flash loan attack on the lending platform Euler Finance resulted in the theft of...
What Is Cyber Essentials and How Can Heimdal Help Your Organization Achieve CE Compliance?
What Is Cyber Essentials and How Can Heimdal Help Your Organization Achieve CE Compliance?Cyber Essentials is a practical, government-backed scheme that will assist you in protecting...
FBI’s Report Shows: Investment Fraud Caused Loses of Over $3 Billion in 2022
FBI’s Report Shows: Investment Fraud Caused Loses of Over $3 Billion in 2022According to the FBI’s annual Internet Crime Report, investment fraud was the most common...
KamikakaBot Malware Used to Attack Southeast Asian Government Agencies
KamikakaBot Malware Used to Attack Southeast Asian Government AgenciesThe Dark Pink APT has been linked to a new wave of attacks using the KamiKakaBot malware against...
Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 Vulnerabilities
Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 VulnerabilitiesAs part of the March vulnerability patching bout, Microsoft has released 23 fixes for Chromium- and...
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security Mechanisms
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security Mechanisms An increasing number of Unified Extensible Firmware Interface (UEFI) security...
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combinedThe latest annual FBI report on the state of cybercrime...
STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else…
STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else…A Ukrainian video game developer has revealed that a hacker has leaked development material...
Software supply chain attacks are on the rise — are you at risk?
Software supply chain attacks are on the rise — are you at risk?Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks...
NetWire Remote Access Trojan Maker Arrested
NetWire Remote Access Trojan Maker ArrestedFrom Brian Krebs: A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime...
How AI Could Write Our Laws
How AI Could Write Our LawsBy Nathan E. Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate...
Employee termination policy
Employee termination policyPURPOSE This policy provides termination guidelines, including the process of disabling former employee access, reclaiming company equipment and finalizing payroll/benefits details. It complements our...
YoroTrooper cyberspies target CIS energy orgs, EU embassies
YoroTrooper cyberspies target CIS energy orgs, EU embassiesA new threat actor named 'YoroTrooper' has been running cyber-espionage campaigns since at least June 2022, targeting government and...
Cybercriminals exploit SVB collapse to steal money and data
Cybercriminals exploit SVB collapse to steal money and dataThe collapse of the Silicon Valley Bank (SVB) on March 10, 2023, has sent ripples of turbulence throughout...
Microsoft March 2023 Patch Tuesday fixes 2 zero-days, 83 flaws
Microsoft March 2023 Patch Tuesday fixes 2 zero-days, 83 flawsToday is Microsoft's March 2023 Patch Tuesday, and security updates fix two actively exploited zero-day vulnerabilities and...
FBI warns of spike in ‘pig butchering’ crypto investment schemes
FBI warns of spike in ‘pig butchering’ crypto investment schemesAmericans are increasingly targeted in 'pig butchering' cryptocurrency investment schemes, according to a public service announcement issued...
Increasing infrastructure security by reducing complexity
Increasing infrastructure security by reducing complexityBy Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Cyber complexity can impede efforts to secure systems. In particular, cyber security...
SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity
SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurityA new report from the Bipartisan Policy Center (BPC) lays out — in stark...
LockBit Ransomware Group Claims SpaceX Contractor Data Theft
LockBit Ransomware Group Claims SpaceX Contractor Data TheftExtortionists With Penchant for Splashy PR Moves Call on Elon Musk to Pay RansomThe LockBit ransomware operation claims to...
New HiatusRAT Malware Targets Business-Grade Routers to Covertly Spy on Victims
New HiatusRAT Malware Targets Business-Grade Routers to Covertly Spy on VictimsA never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America,...



























