Bookmarks (36)

  • screenshot

    DOJ Says Doctor is Malware Mastermind

    The U.S. Department of Justice indites middle-aged doctor, accusing him of being a malware mastermind.

  • screenshot

    APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

    Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.

  • screenshot

    Conti Ransomware Attack Spurs State of Emergency in Costa Rica

    The threat group has leaked data that it claims was stolen in the breach and is...

  • screenshot

    VHD Ransomware Linked to North Korea’s Lazarus Group

    Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the...

  • screenshot

    China-linked APT Caught Pilfering Treasure Trove of IP

    A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly...

  • screenshot

    Cyberespionage APT Now Identified as Three Separate Actors

    The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups...

  • screenshot

    Cyberattacks Rage in Ukraine, Support Military Operations

    At least five APTs are believed involved with attacks tied ground campaigns and designed to damage...

  • screenshot

    Nation-state Hackers Target Journalists with Goldbackdoor Malware

    A campaign by APT37 used a sophisticated malware to steal information about sources , which appears...

  • screenshot

    Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks

    Ghostwriter is one of 3 campaigns using war-themed attacks, with cyber-fire coming in from government-backed actors...

  • screenshot

    DOJ Indicts Russian Gov’t Employees Over Targeting Power Sector

    The supply-chain attack on the U.S. energy sector targeted thousands of computers at hundreds of organizations,...

  • screenshot

    Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection

    Mustang Panda's already sophisticated cyberespionage campaign has matured even further with the introduction of a brand-new...

  • screenshot

    Russia Lays Groundwork for Cyberattacks on U.S. Infrastructure

    "Evolving intelligence" shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House...

  • screenshot

    Agencies Warn on Satellite Hacks & GPS Jamming Affecting Airplanes, Critical Infrastructure

    The Russian invasion of Ukraine has coincided with the jamming of airplane navigation systems and hacks...

  • screenshot

    Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet

    The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting...

  • screenshot

    Reporting Mandates to Clear Up Feds’ Hazy Look into Threat Landscape – Podcast

    It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending...

  • screenshot

    Another Destructive Wiper Targets Organizations in Ukraine

    CaddyWiper is one in a barrage of data-wiping cyber-attacks to hit the country since January as...

  • screenshot

    Cyberattacks Against Israeli Government Sites: ‘Largest in the Country’s History’

    DDoS attacks against Israel telecom companies took down government sites, sparking a temporary state of emergency.

  • screenshot

    Cybercrooks’ Political In-Fighting Threatens the West

    They’re choosing sides in the Russia-Ukraine war, beckoning previously shunned ransomware groups and thereby reinvigorating those...

  • screenshot

    Russia Issues Its Own TLS Certs

    The country’s citizens are being blocked from the internet because foreign certificate authorities can't accept payments...

  • screenshot

    Russia May Use Ransomware Payouts to Avoid Sanctions

    FinCEN warns financial institutions to beware of unusual cryptocurrency payments or illegal transactions Russia may use...

  • screenshot

    APT41 Spies Broke Into 6 US State Networks via a Livestock App

    The China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to...

  • screenshot

    Russia Leaks Data From a Thousand Cuts–Podcast

    It’s not just Ukraine: There's a flood of intel on Russian military, nukes and crooks, says...

  • screenshot

    Ukraine Hit with Novel ‘FoxBlade’ Trojan Hours Before Invasion

    Microsoft detected cyberattacks launched against Ukraine hours before Russia’s tanks and missiles began to pummel the...

  • screenshot

    Ukraine-Russia Cyber Warzone Splits Cyber Underground

    A pro-Ukraine Conti member spilled 13 months of the ransomware group's chats, while cyber actors are...

  • screenshot

    White House Denies Mulling Massive Cyberattacks Against Russia

    The options reportedly included tampering with trains, electric service and internet connectivity, hampering Russia's military operations...

  • screenshot

    Iranian State Broadcaster Clobbered by ‘Clumsy, Buggy’ Code

    Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of...

  • screenshot

    Ukrainian DDoS Attacks Should Put US on Notice–Researchers

    On Tuesday, institutions central to Ukraine’s military and economy were hit with denial-of-service (DoS) attacks. Impact...

  • screenshot

    MoleRats APT Flaunts New Trojan in Latest Cyberespionage Campaign

    Researchers from Proofpoint have spotted a new Middle East-targeted phishing campaign that delivers a novel malware...

  • screenshot

    Ex-Gumshoe Nabs Cybercrooks with FBI Tactics

    Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from...

  • screenshot

    CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug

    Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows...

  • screenshot

    QuaDream, 2nd Israeli Spyware Firm, Weaponizes iPhone Bug

    The now-patched flaw that led to the ForcedEntry exploit of iPhones was exploited by both NSO...

  • screenshot

    FBI: Use a Burner Phone at the Olympics

    The warning follows a Citizen Lab report that found the official, mandatory app has an encryption...

  • screenshot

    MoleRats APT Launches Spy Campaign on Bankers, Politicians, Journalists

    State-sponsored cyberattackers are using Google Drive, Dropbox and other legitimate services to drop spyware on Middle-Eastern...

  • screenshot

    Merck Awarded $1.4B Insurance Payout over NotPetya Attack

    Court rules ‘War or Hostile Acts’ exclusion doesn’t apply to the pharma giant's 2017 cyberattack.

  • screenshot

    Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say

    Disruptive malware attacks on Ukrainian organizations (posing as ransomware attacks) are very likely part of Russia’s...

  • screenshot

    Cloned Dept. of Labor Site Hawks Fake Government Contracts

    A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative...