News

  • New Typosquatting and Repojacking Tactics Uncovered on PyPI

    ReversingLabs uncovered two suspicious packages on PyPI: NP6HelperHttptest and NP6HelperHttper Read More

    Read More

  • Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates

    U.S. and U.K. authorities have seized the darknet websites run by LockBit, a prolific and destructive ransomware group that has claimed more than 2,000 victims worldwide and extorted over $120 million in payments. Instead of listing data stolen from ransomware victims who didn’t pay, LockBit’s victim shaming website now offers free recovery tools, as well…

    Read More

  • Linux Malware Campaign “Migo” Targets Redis For Cryptomining

    Cado Security said this campaign introduces unique techniques to compromise the security of Redis servers Read More

    Read More

  • LockBit Ransomware Takedown: What You Need to Know about Operation Cronos

    What businesses should know about Operation Cronos and LockBit, one of the largest ransomware takedowns in history Read More

    Read More

  • Top UK Universities Recovering Following Targeted DDoS Attack

    The attack, which has been claimed by Anonymous Sudan, has been confirmed to have impacted IT services at the universities of Cambridge and Manchester Read More

    Read More

  • Initial Ransomware Demands Jump 20% to $600,000 in 2023

    Arctic Wolf found that the median ransomware demand was $600,000 in 2023, a 20% rise on the previous year Read More

    Read More

  • Microsoft Is Spying on Users of Its AI Tools

    Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools—presumably coding tools—to improve their hacking abilities. From their report: In collaboration with OpenAI, we are sharing threat intelligence showing detected state affiliated adversaries—tracked as Forest Blizzard, Emerald Sleet, Crimson Sandstorm, Charcoal Typhoon, and Salmon Typhoon—using LLMs to augment cyberoperations. The only…

    Read More

  • A fundamental guide to endpoint security

    Anyone that utilizes technology in their daily lives understands that it is ever-changing, and the sentiment is especially true within the cybersecurity industry. Adversaries continue to evolve with new tactics to bypass defenses, so it is necessary that the methods of detecting and preventing these threats do so at an even more rapid pace. However,…

    Read More

  • A fundamental guide to endpoint security

    Anyone that utilizes technology in their daily lives understands that it is ever-changing, and the sentiment is especially true within the cybersecurity industry. Adversaries continue to evolve with new tactics to bypass defenses, so it is necessary that the methods of detecting and preventing these threats do so at an even more rapid pace. However,…

    Read More

  • Insider Steals 80,000 Email Addresses From District Councils

    A former employee at Stratford-on-Avon District Council stole residents’ emails to promote his business Read More

    Read More

News, Advisories and much more

Exit mobile version