Cyber Security Hub explores why cryptocurrencies are an ever-growing target for malicious actors
Posts tagged "hackers"
Malware Posing as Russia DDoS Tool Bites Pro-Ukraine Hackers
Be careful when downloading a tool to cyber-target Russia: It could be an infostealer wolf dressed in sheep’s clothing that grabs your cryptocurrency info instead.
Threatpost
IOTW: Hackers Target Italy
Italy has been the victim of two ransomware attacks this month. The first blocked a COVID-19 booking system, which is not only a public health hazard but interferes with Italy’s recent healthcare mand…
Solar Winds Hackers Continue To Cause Grief
If bad actors socially engineered all the support teams around the world, they could get a lot more people clicking on emails and mobile phones authorized which they could use to gain access to infras…
Hackers Exploit Post-COVID Return to Offices
Spoofed CIO ‘pandemic guideline’ emails being used to steal credentials.
Threatpost
DarkSide Getting Taken to ‘Hackers’ Court’ For Not Paying Affiliates
A shadow court system for hackers shows how professional ransomware gangs have become.
Threatpost
IOTW: DC Police Department Hit with Ransomware; Hackers "Quit"
Incident is reflective of an evolution of ransomware attacks, from encrypting files and demanding ransom money for a decryption key to encrypting the file and threatening to publish the information if…
IOTW: Hackers Prove Modern-Day Security Firm Is Anything But
The breach highlights the irony of a security company leveling-up the industry by going hi-tech, utilizing IoT and ML technologies doing anything but, by losing 150,000 of its live-feed security camer…
IOTW: The U.S. Department Of Justice Takes A Stand Against North Korean Hackers
The indictment serves as evidence that the United States is increasingly willing to punish cybercriminal actors; a move that was previously reserved for government hacks. Included in the indictment is…
IOTW: Ethical Hackers Discover Several Apple Vulnerabilities—And The Payout May…
Ethical hackers recently participated in Apple’s vulnerability bounty program and scored big. Over the span of three months, five hackers, led by 20-year-old Sam Curry, uncovered 55 vulnerabilities. E…