Security

bg
Ransomware gang threatens to ‘overthrow’ new Costa Rica government, raises demand to $20 million

Ransomware gang threatens to ‘overthrow’ new Costa Rica...

The ransomware group behind an attack on several Costa Rican government ministries...

bg
Experts show how to run malware on chips of a turned-off iPhone

Experts show how to run malware on chips of a turned-off...

Researchers devised an attack technique to tamper the firmware and execute a malware...

bg
Researchers warn of REvil return after January arrests in Russia

Researchers warn of REvil return after January arrests...

The notorious REvil ransomware group has made yet another reemergence on the cybercrime...

bg
‘Facestealer’ malware remains a quiet scourge in Google Play Store apps

‘Facestealer’ malware remains a quiet scourge in Google...

Facestealer is geared toward stealing Facebook credentials Attackers use compromised...

bg
Ukrainian national sentenced to 4 years in prison for selling access to hacked servers

Ukrainian national sentenced to 4 years in prison for selling...

A 28-year-old Ukrainian national has been sentenced to four years in prison for...

bg
Malicious Help File Disguised as Missing Coins Report and Wage Statement (*.chm)

Malicious Help File Disguised as Missing Coins Report and...

The ASEC analysis team has discovered a continuous distribution of malware disguised...

bg
Eternity Project: You can pay $260 for a stealer and $490 for a ransomware

Eternity Project: You can pay $260 for a stealer and $490...

Researchers from threat intelligence firm Cyble analyzed the Eternity Project Tor...

bg
May 08 – May 14 Ukraine – Russia the silent cyber conflict

May 08 – May 14 Ukraine – Russia the silent cyber conflict

This post provides a timeline of the events related to Russia invasion of Ukraine...

bg
Ukraine CERT-UA warns of new attacks launched by Russia-linked Armageddon APT

Ukraine CERT-UA warns of new attacks launched by Russia-linked...

Ukraine Computer Emergency Response Team (CERT-UA) reported a phishing campaign...

bg
Security Affairs newsletter Round 365 by Pierluigi Paganini

Security Affairs newsletter Round 365 by Pierluigi Paganini

A new round of the weekly Security Affairs newsletter arrived! Every week the best...

bg
Sysrv-K, a new variant of the Sysrv botnet includes new exploits

Sysrv-K, a new variant of the Sysrv botnet includes new...

Microsoft reported that the Sysrv botnet is targeting Windows and Linux servers...

bg
OpRussia update: Anonymous breached other organizations

OpRussia update: Anonymous breached other organizations

Another week has passed and Anonymous has hacked other Russian companies and leaked...

bg
The LEGION collective calls to action to attack the final of the Eurovision song contest

The LEGION collective calls to action to attack the final...

The Pro-Russian volunteer movement known as LEGION is calling to launch DDoS attacks...

bg
Pro-Russian hacktivists target Italy government websites

Pro-Russian hacktivists target Italy government websites

Pro-Russian hacker group Killnet targeted the websites of several Italian institutions,...

bg
SonicWall urges customers to fix SMA 1000 vulnerabilities

SonicWall urges customers to fix SMA 1000 vulnerabilities

SonicWall warns customers to address several high-risk security flaws impacting...

bg
As Lincoln College closes doors, president looks back on crippling ransomware attack

As Lincoln College closes doors, president looks back on...

David Gerlach says the incident only intensified pressures that were already hurting...

bg
EU lawmakers reach agreement on stronger cyber rules for critical sectors

EU lawmakers reach agreement on stronger cyber rules for...

The revised directive — called NIS2 — would replace the first EU-wide law on cybersecurity...

bg
Zyxel fixed firewall unauthenticated remote command injection issue

Zyxel fixed firewall unauthenticated remote command injection...

Zyxel addressed a critical flaw affecting Zyxel firewall devices that allows unauthenticated,...

bg
Collapse of Luna cryptocurrency leads to $11 million exploit on Venus Protocol

Collapse of Luna cryptocurrency leads to $11 million exploit...

Venus Protocol, a decentralized money market, announced on Thursday evening that...

bg
Iran-linked COBALT MIRAGE group uses ransomware in its operations

Iran-linked COBALT MIRAGE group uses ransomware in its...

Iranian group used Bitlocker and DiskCryptor in a series of attacks targeting organizations...

bg
New Nerbian RAT spreads via malspam campaigns using COVID-19

New Nerbian RAT spreads via malspam campaigns using COVID-19

Researchers spotted a new remote access trojan, named Nerbian RAT, which implements...

bg
Password stealer now spreading from a GitHub link that uses NFT content as bait

Password stealer now spreading from a GitHub link that...

Researchers have discovered a campaign to spread the RedLine Stealer through YouTube...

bg
Ukrainian sentenced to 4 years for selling hacked passwords

Ukrainian sentenced to 4 years for selling hacked passwords

A Ukrainian man was sentenced Thursday to four years in federal prison and ordered...

bg
Google to create security team for open source projects

Google to create security team for open source projects

The “Open Source Maintenance Crew” will be tasked with improving the security of...

bg
Biden extends US telecom supply chain order aimed at Huawei, ZTE

Biden extends US telecom supply chain order aimed at Huawei,...

The Trump-era executive order prohibited U.S. companies from using telecommunications...

bg
CIA selects new CISO with deep private sector experience

CIA selects new CISO with deep private sector experience

The CIA announced Thursday it had selected a new chief information security officer,...

bg
Italy stops wide-ranging Russian attack on websites of parliament, military, health agency

Italy stops wide-ranging Russian attack on websites of...

The pro-Russian hacking group known as Killnet took credit for the attacks. Several...

bg
Massive hacking campaign compromised thousands of WordPress websites

Massive hacking campaign compromised thousands of WordPress...

Researchers uncovered a massive hacking campaign that compromised thousands of WordPress...

bg
How a pentester’s attempt to be ‘as realistic as possible’ alarmed cybersecurity firms

How a pentester’s attempt to be ‘as realistic as possible’...

Over the last several weeks, researchers at multiple security firms have been scratching...

bg
DEA Investigating Breach of Law Enforcement Data Portal

DEA Investigating Breach of Law Enforcement Data Portal

The U.S. Drug Enforcement Administration (DEA) says it is investigating reports...

bg
Five Eyes agencies warn of attacks on MSPs

Five Eyes agencies warn of attacks on MSPs

Cybersecurity authorities from Five Eye warn of threats targeting managed service...

bg
Red TIM Research (RTR) founds 2 bugs affecting F5 Traffix SDC

Red TIM Research (RTR) founds 2 bugs affecting F5 Traffix...

Experts at TIM research laboratory, Red Team Research (RTR), have disclosed a couple...