News
  • "Two Million Android Malware Apps Discovered on Google Play"

    More than two million people have been tricked into installing new Android malware, phishing, and adware apps from the Google Play store. Dr. Web antivirus detected the apps that appear to be useful utilities and system optimizers but are the source of…

  • "Russian Hackers Use Western Networks to Attack Ukraine"

    Security researchers at Lupovis have discovered that Russian hackers are using their presence inside the networks of organizations in the UK, US, and elsewhere to launch attacks against Ukraine.  The researchers set up a series of decoys on the web…

  • "Four Indicted After Hacking US Businesses, Filing False Tax Returns"

    Four men from the UK and Sweden have been indicted on several charges in connection with an alleged attempt to hack into the computers of several US businesses and file fraudulent tax returns using stolen personal information. On November 30, three of…

  • "Economic Uncertainty Will Greatly Impact the Spread of Cybercrime"

    Norton has released its top cyber trends to watch in 2023, highlighting that the economy will have the most influence on the spread of cybercrime next year. According to experts, the pressures associated with economic uncertainty and rising costs will…

  • "Wiper, Disguised as Fake Ransomware, Targets Russian Orgs"

    CryWiper is a new malicious program that functions similarly to crypto-ransomware. It overwrites and renames files before dropping a text file containing a ransom note and a Bitcoin address. However, the program deletes the contents of a victim's files.…

  • "Hackers Hijack Linux Devices Using PRoot Isolated File Systems"

    In Bring Your Own File System (BYOF) attacks, hackers are abusing the open-source Linux PRoot utility to provide a consistent repository of malicious tools that work across multiple Linux distributions. A BYOF attack occurs when threat actors create a…

  • "New BMC Supply Chain Vulnerabilities Pose Threat to Server, Cloud Computing Ecosystem"

    Researchers discovered three different security flaws in American Megatrends Inc. (AMI) MegaRAC Baseboard Management Controller (BMC) software, posing a threat to technology supply chains and major Information Technology (IT) hardware brands that support…

  • "Open-Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware"

    Due to its poor architecture and programming, an open-source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities. Cryptonite, unlike other ransomware strains, is not for sale on the cybercriminal underground and was…

  • "Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds"

    According to a study conducted by researchers from the University of South Florida and Georgia State University, stolen data products, like most legal commodities, pass through a supply chain that includes producers, wholesalers, and consumers. However,…

  • "Binance Freezes $3 Million Worth of Crypto Stolen in Ankr Hack"

    After Ankr, the hacking of the Web3 infrastructure provider, Binance, one of the last remaining cryptocurrency giants, froze nearly $3 million in cryptocurrency. Ankr stated that $5 million in Binance coin was stolen from the platform. The provider plans…

  • "GAO Calls for Action to Improve Critical Infrastructure IoT and OT Cybersecurity"

    According to the Government Accountability Office (GAO), federal agencies in charge of critical infrastructure cybersecurity have not conducted risk assessments for Operational Technology (OT) and Internet of Things (IoT) systems and devices. Electronic…

  • "Black Proxies Enable Threat Actors to Conduct Malicious Activity"

    Security researchers at DomainTools have discovered that threat actors are using criminal proxy networks to obfuscate their illegal activities by hiding behind hijacked IP addresses and using the same to create an appearance of legitimacy.  The…