-
New Typosquatting and Repojacking Tactics Uncovered on PyPI
ReversingLabs uncovered two suspicious packages on PyPI: NP6HelperHttptest and NP6HelperHttper Read More
-
Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates
U.S. and U.K. authorities have seized the darknet websites run by LockBit, a prolific and destructive ransomware group that has claimed more than 2,000 victims worldwide and extorted over $120 million in payments. Instead of listing data stolen from ransomware victims who didn’t pay, LockBit’s victim shaming website now offers free recovery tools, as well…
-
Linux Malware Campaign “Migo” Targets Redis For Cryptomining
Cado Security said this campaign introduces unique techniques to compromise the security of Redis servers Read More
-
LockBit Ransomware Takedown: What You Need to Know about Operation Cronos
What businesses should know about Operation Cronos and LockBit, one of the largest ransomware takedowns in history Read More
-
Top UK Universities Recovering Following Targeted DDoS Attack
The attack, which has been claimed by Anonymous Sudan, has been confirmed to have impacted IT services at the universities of Cambridge and Manchester Read More
-
Initial Ransomware Demands Jump 20% to $600,000 in 2023
Arctic Wolf found that the median ransomware demand was $600,000 in 2023, a 20% rise on the previous year Read More
-
Microsoft Is Spying on Users of Its AI Tools
Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools—presumably coding tools—to improve their hacking abilities. From their report: In collaboration with OpenAI, we are sharing threat intelligence showing detected state affiliated adversaries—tracked as Forest Blizzard, Emerald Sleet, Crimson Sandstorm, Charcoal Typhoon, and Salmon Typhoon—using LLMs to augment cyberoperations. The only…
-
A fundamental guide to endpoint security
Anyone that utilizes technology in their daily lives understands that it is ever-changing, and the sentiment is especially true within the cybersecurity industry. Adversaries continue to evolve with new tactics to bypass defenses, so it is necessary that the methods of detecting and preventing these threats do so at an even more rapid pace. However,…
-
A fundamental guide to endpoint security
Anyone that utilizes technology in their daily lives understands that it is ever-changing, and the sentiment is especially true within the cybersecurity industry. Adversaries continue to evolve with new tactics to bypass defenses, so it is necessary that the methods of detecting and preventing these threats do so at an even more rapid pace. However,…
-
Insider Steals 80,000 Email Addresses From District Councils
A former employee at Stratford-on-Avon District Council stole residents’ emails to promote his business Read More