News

  • Qilin ransomware: What you need to know

    Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Ransomware attacks skyrocket, with LockBit 3.0 at the forefront

    Newly-released research indicates that ransomware attacks reached a record high in May, with the surge primarily fueled by a massive increase in the number of attacks perpetrated by the LockBit ransomware group and its affiliates. Read more in my article on the Exponential-e blog. Read More

    Read More

  • LockBit Most Prominent Ransomware Actor in May 2024

    The LockBit ransomware group returned the fold to launch 176 attacks in May 2024 following a law enforcement takedown, NCC Group found Read More

    Read More

  • How Teens Date in the Digital Age

    Falling in love in the internet age is a whole different ball game to the social-media-free ’70s, ’80s and ’90s. Awkward calls on the home phone, sending cards in the mail, and making mixtapes were all key relationship milestones back in the days of roller skates. But fast forward to the new millennium and dating…

    Read More

  • French Diplomatic Entities Targeted by Russian-Aligned Nobelium

    The French cybersecurity agency has warned that Russian-aligned threat actor has been targeting public organizations for years Read More

    Read More

  • How to Get Kids Focused on Their Online Privacy

    Kids engage online far differently than adults. Between group chats, social apps, and keeping up with digital trends, their interests, and attention spans constantly shift, which means online privacy concerns get sidelined. Here are a few ways to move online privacy center stage. 7 Tips to Help Kids Protect Their Privacy 1. Make Privacy Fun and Relatable Few things will put kids to sleep faster than talking…

    Read More

  • Recovering Public Keys from Signatures

    Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead have a message and a signature, assume the signature is valid, and want to know which…

    Read More

  • The Best Proxy Servers for Multi-Accounting

    The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Business owners are increasingly recognizing its positive impact on business growth. Many marketing and sales strategies use different accounts on a single platform.…

    Read More

  • Crypto Firm Kraken Calls the Cops After Researchers Attempt “Extortion”

    A cryptocurrency exchange claims to have been extorted after ‘researchers’ exploited a vulnerability to steal millions Read More

    Read More

  • Threat Actor Claims AMD and Apple Breaches

    Notorious threat actor IntelBroker is claiming to have stolen data from Apple and AMD Read More

    Read More

News, Advisories and much more

Exit mobile version