-
New ransomware gang RA Group quickly expanding operations
PRIVACY PRIVACY Researchers warn of a new ransomware threat dubbed RA Group that also engages in data theft and extortion and has been hitting organizations since late April. The group’s ransomware program is built from the leaked source code of a different threat called Babuk. “Like other ransomware actors, RA Group also operates a data…
-
Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam
PRIVACY PRIVACY Three seconds of audio is all it takes. Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new breed of scam. With a small sample of audio, they can clone the voice of nearly anyone and send bogus messages by voicemail or voice messaging texts. The aim,…
-
Law enforcement crackdowns and new techniques are forcing cybercriminals to pivot
PRIVACY PRIVACY It can seem like cybercriminals are running rampant across the world’s digital infrastructure, launching ransomware attacks, scams, and outright thefts with impunity. Over the last year, however, US and global authorities seized $112 million from cryptocurrency investment scams, disrupted the Hive ransomware group, broke up online illegal drug marketplaces, and sanctioned crypto money…
-
Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft.
PRIVACY PRIVACY Maybe you know that sinking feeling all too well. “Where did I leave my phone?” The minutes pass as you search around the house, then you head into the garage to look between the driver’s seat and console of your car. No luck. So it’s back into the house where you turn over…
-
Is My Child Being Cyberbullied Or Is It Just Banter?
PRIVACY PRIVACY If you were to ask me what I consider to be the most attractive attribute in a person, it would be kindness but only closely followed by a sense of humour. There’s something about somebody who can tell a funny story that I just love. And humour can be a great bonding experience…
-
Qilin’s Dark Web Ransomware Targets Critical Sectors
PRIVACY PRIVACY Group-IB’s threat intelligence team said it infiltrated and analyzed Qilin’s inner workings Read More
-
Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme
PRIVACY PRIVACY The defendant was also ordered to pay $1.6m in restitution and forfeit property used for the crimes Read More
-
New security tool lets you bypass SSL errors
PRIVACY PRIVACY Endpoint-based web and cloud security provider Dope Security has launched a new instant secure socket layer (SSL) error resolution feature on its secure web gateway (SWG) offering, Dope.swg. The new feature is added to simplify SSL inspection conducted by Dope’s SWG and helps admins bypass SSL errors generated as a result of the…
-
Lancefly APT Custom Backdoor Targets Government and Aviation Sectors
PRIVACY PRIVACY Symantec’s Threat Hunter Team said these campaigns have been ongoing for several years Read More
-
Micro-Star International Signing Key Stolen
PRIVACY PRIVACY Micro-Star International—aka MSI—had its UEFI signing key stolen last month. This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether regions without triggering a warning. To make matters worse, Matrosov said, MSI doesn’t have an automated patching process the way Dell, HP, and many…