Hackers breach Afghan government in China-related espionage campaign, cybersecurity firm finds
State-sponsored actors breach Afghan government in China-related espionage campaign, cybersecurity firm finds
Ransom Mafia. Analysis of The World's First Ransomware Cartel - Analyst1
Four of Russia's largest ransomware gangs have affiliated, sharing hacking resources but apparently not the profits, says Jon DiMaggio, chief security strategist at Analyst1. DiMaggio identifies the four groups and notes that "their ransomware strains can be more dangerous than any one individual cyberweapon."
Let’s ban ransomware payments
There is only one way to stop ransomware attacks: banning the payment of ransom demands. We take a look at why the time has come for governments to do exactly that.
Unpatched Critical RCE Bug Allows Industrial, Utility Takeovers
The 'ModiPwn' bug lays open production lines, sensors, conveyor belts, elevators, HVACs and more that use Schneider Electric PLCs.
Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software
Last week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya, a Miami-based company whose products help system administrators manage large networks remotely.…
Should making a ransomware payment be illegal? It's complicated | Verdict
Should making a ransomware payment be illegal? The question is simple, but the answer is more complicated that we may think.
What you need to know about Process Ghosting, a new executable image tampering attack
Several common process tampering attacks exploit the gap between process creation and when security products are notified. Elastic Security detects a variety of such techniques, including Doppelgänging, Herpaderping, and a new technique: Ghosting
Hiccup in Akamai’s DDoS Mitigation Service Triggers Massive String of Outages
An hour-long outage impacting airlines, banks and Hong Kong Stock exchange is believed to be caused by a service designed to protect against outages tied to distributed denial of service attacks.