On July 8, the Russian hacktivist DDoS group “Killnet” claimed responsibility for an attack on the website of US Congress. A Library of Congress spokesperson told CyberScoop that the distributed denial of service (DDoS) attacks “briefly affected public access” on July 7.
Back in February I applauded Microsoft for taking a decisive step in the fight against macro malware. Here’s part of what I wrote: Microsoft has announced that… it is changing the default behavior of Office applications so that they block macros in files from the internet.
A new ransomware operation named ‘0mega’ targets organizations worldwide in double-extortion attacks and demands millions of dollars in ransoms.
New Zealand-based cybersecurity firm Emsisoft has released a free decryption tool to help AstraLocker and Yashma ransomware victims recover their files without paying a ransom.
Following ongoing research our team, IBM Security X-Force has uncovered evidence indicating that the Russia-based cybercriminal syndicate “Trickbot group” has been systematically attacking Ukraine since the Russian invasion — an unprecedented shift as the group had not previously targeted Ukra
Linux is a popular operating system for servers and cloud infrastructures, and as such it’s not a surprise that it attracts threat actors’ interest and we see a continued growth and innovation of malware that targets Linux, such as the recent Symbiote malware that was discovered by our research
Executive Summary SentinelLabs has identified a new cluster of threat activity targeting Russian organizations. We assess with high-confidence that the threat actor responsible for the attacks is a Chinese state-sponsored cyber espionage group, as also recently noted by Ukraine CERT (CERT-UA).
A security advisory for a vulnerability (CVE) published by MITRE has accidentally been exposing links to remote admin consoles of over a dozen vulnerable IP devices since at least April 2022.
Apple previewed a hardened “Lockdown Mode” on Wednesday that’s designed to thwart sophisticated attackers, including spyware sold to governments. Lockdown Mode will be rolled out this fall with macOS Ventura, iOS 16, and iPadOS 16.
The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method.
A new ransomware operation called RedAlert, or N13V, encrypts both Windows and Linux VMWare ESXi servers in attacks on corporate networks. The new operation was discovered today by MalwareHunterTeam, who tweeted various images of the gang’s data leak site.
Unit 42 continuously hunts for new and unique malware samples that match known advanced persistent threat (APT) patterns and tactics. On May 19, one such sample was uploaded to VirusTotal, where it received a benign verdict from all 56 vendors that evaluated it.
Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure.
A quick search on Shodan Trends shows us that although the situation has gotten much better over the last few years, and it still seems to be slowly improving, more than 5,000 vulnerable machines (exactly 5,565 at the time of writing) are still accessible from the internet.
TensorFlow is a machine learning and AI library that has enabled so much and brought AI within the reach of most developers. But it’s fair to say that it’s not for the less powerful computers.
There is a traditional Japanese concept called wabi-sabi that recognizes the world as impermanent, evolving, and unfinished. You could call it the beauty of embracing imperfection.
Having worked odd jobs as a teenager to save up for the pumpkin orange electric Gibson, then 32-year-old Bachman was heartbroken. On tour, he’d been diligent about shackling the guitar to hotel room toilets with tow truck chains whenever he left the room.