Cyberattack brings down InterContinental Hotels' booking systems Online booking systems and other services knocked offline amid network intrusion Cyber-crime06 Sep 2022 | 16
Newly discovered cyberspy crew targets Asian governments and corporations Worok uses mix of publicly available tools, custom malware to steal info, gang active since 2020 Security06 Sep 2022 |
Oh no, that James Webb Space Telescope snap might actually contain malware Is nothing sacred? Research01 Sep 2022 | 25
That 'clean' Google Translate app is actually Windows crypto-mining malware Ah, nothing like a classic Trojan horse Cyber-crime30 Aug 2022 | 20
77% of security leaders fear we’re in perpetual cyberwar from now on In brief Also, Charming Kittens from Iran scrape email inboxes, France could fine Google again, and more CSO27 Aug 2022 | 32
Shout-out to whoever went to Black Hat and had North Korean malware on their PC I am the one who NOCs CSO25 Aug 2022 | 25
Ransomware attack on UK water company clouded by confusion Clop gang thought it hit Thames Water – but real victim was elsewhere Cyber-crime18 Aug 2022 | 44
After 7 years, long-term threat DarkTortilla crypter is still evolving .NET-based malware can push wide range of malicious payloads, and evades detection, Secureworks says CSO17 Aug 2022 | 2
Open source VideoLAN media player asks why it's blocked in India Rubbishes suggestions poisoned clones or ancient malware are worthy reasons for ban Software17 Aug 2022 | 29
Dutch authorities arrest 29-year-old dev with suspected ties to Tornado Cash The arrest comes days after US Treasury levies sanctions against the crypto mixing service Cyber-crime15 Aug 2022 | 20
US reveals 'Target' pic of Conti man with $10m reward offer Fashion Police chipping in on the bounty related to costliest strain of ransomware on record Security12 Aug 2022 | 6
Sonatype spots another PyPI package behaving badly Identity of a real person was used to lend credence to a package that dropped cryptominer in memory Cyber-crime11 Aug 2022 |
Don't be surprised if your organization suffers multiple cyberattacks Black Hat Failing to fix flaws, a crowded threat group scene, RaaS, and dependencies among crooks are fueling the trend Security11 Aug 2022 | 5
Maui ransomware linked to North Korean group Andariel Attack origins point to April 2021 first strike on Japanese target Security10 Aug 2022 | 1
Dark Utilities C2 service draws thousands of cyber criminals Nascent platform provides miscreants an easier and cheaper way to launch remote access, DDoS, and other attacks Security08 Aug 2022 | 1
DuckDuckGo says Hell, Hell, No to those Microsoft trackers after web revolt In brief Plus: That Twitter privacy leak, scammers send Ubers for victims, critical flaw in Cisco gear, and more Security06 Aug 2022 | 38
How cybercrims embrace messaging apps to spread malware, communicate Underground forums are so last year. Telegram, Discord offer better privacy, functionality to criminals, says Intel 471 Security02 Aug 2022 | 5
Miscreants aim to cause Discord discord with malicious npm packages LofyLife campaign comes amid GitHub security lockdown Research02 Aug 2022 | 2
Vietnamese attacker circumvents Facebook security with ‘DUCKTAIL’ malware Session cookies and 2FA subversion allow takeover of biz and ad accounts, lead to unauthorized ad buys Research27 Jul 2022 | 8
Luca Stealer malware spreads rapidly after code handily appears on GitHub Cool, another Rust project ... Oh Security26 Jul 2022 | 3
Ransomware less popular this year, but malware up: SonicWall cyber threat report Be ready for a rebound, and protect yourself with patching and segmentation Security26 Jul 2022 | 1
Infosec not your job but your responsibility? How to be smarter than the average bear Opinion Many of last week's security stories tell the same tale Security25 Jul 2022 | 20
Microsoft closes off two avenues of attack: Office macros, RDP brute-forcing Blockade against VBA scripts in downloaded files is back on by default CSO22 Jul 2022 | 15
US Cyber Command spots another 20 malware strains targeting Ukraine Plus Mandiant, Cisco Talos uncover digital espionage Research21 Jul 2022 | 1
Suspected Gozi malware gang 'CIO' extradited to US on fraud, hacking charges Euro man allegedly known as 'Virus' faces years behind bars if convicted Cyber-crime20 Jul 2022 | 4
DoJ, FBI recover $500,000 in ransomware payments to Maui gang Money paid by healthcare facilities to North Korean group traced through blockchain and Chinese launderers Security20 Jul 2022 | 2
Google pulls malware-infected apps in its Store, over 3 million users at risk Some people call me the code cowboy, some call me the gangster of root, 'cause I'm a Joker Security19 Jul 2022 | 6
Botnet malware disguises itself as password cracker for industrial controllers Can't get into that machine? No problem, just trust this completely sketchy looking tool Research18 Jul 2022 | 8
HavanaCrypt ransomware sails in as a fake Google update Difficult to detect, hiding its window by using the ShowWindow function in Windows Security11 Jul 2022 | 5
US military contractor moves to buy Israeli spy-tech company NSO Group Biden blacklist a stumbling block for any possible deal Security11 Jul 2022 | 22
IT reseller giant SHI International knocked offline by cyberattack Major supplier to US government and enterprise only just getting back on its feet Security07 Jul 2022 | 8
Apple's latest security feature could literally save lives Cupertino is so sure of Lockdown Mode it's offering $2m to bug hunters to break it Personal Tech06 Jul 2022 | 57
Hive ransomware gang rapidly evolves with complex encryption, Rust code RaaS malware devs have been busy bees Research06 Jul 2022 | 3
Near-undetectable malware linked to Russia's Cozy Bear The fun folk who attacked Solar Winds using a poisoned CV and tools from the murky world of commercial hackware Research06 Jul 2022 | 64
AstraLocker ransomware reportedly closes doors to pursue cryptojacking Why go through the hassle of demands and decryption when quietly mining is so much easier? Cyber-crime06 Jul 2022 | 2
$185m anti-malware patent dispute: Norton and Columbia University fight on Decade-old spat over security tech not over yet as New York institution files for enhanced damages Legal04 Jul 2022 | 14
Google location tracking to forget you were ever at that medical clinic In brief Plus: Cyber-mercenaries said to target legal world, backdoor found on web servers, and more Security02 Jul 2022 | 75
AMD targeted by RansomHouse, attackers claim to have '450Gb' in stolen data Relative cybercrime newbies not clear on whether they're alleging to have gigabits or gigabytes of chip biz files Cyber-crime28 Jun 2022 | 7
Microsoft Defender goes cross-platform for the masses Redmond's security brand extended to multiple devices without stomping on other solutions Security17 Jun 2022 | 16
Chinese-sponsored gang Gallium upgrades to sneaky PingPull RAT Broadens targets from telecoms to finance and government orgs Research14 Jun 2022 | 2
HelloXD ransomware bulked up with better encryption, nastier payload Russian-based group doubles the extortion by exfiltrating the corporate data before encrypting it. Security13 Jun 2022 | 5
Symbiote Linux malware spotted – and infections are 'very hard to detect' Performing live forensics on hijacked machine may not turn anything up, warn researchers Research10 Jun 2022 | 21
Emotet malware gang re-emerges with Chrome-based credit card heistware Crimeware groups are re-inventing themselves Research10 Jun 2022 | 5
Chinese 'Aoqin Dragon' gang runs undetected ten-year espionage spree Researcher spots it targeting Asian government and telco targets, probably with Beijing's approval Research10 Jun 2022 | 12
Symantec: More malware operators moving in to exploit Follina Meanwhile Microsoft still hasn't patched the fatal flaw Security09 Jun 2022 | 11
Now Windows Follina zero-day exploited to infect PCs with Qbot Data-stealing malware also paired with Black Basta ransomware gang Research09 Jun 2022 | 4
Even Russia's Evil Corp now favors software-as-a-service Albeit to avoid US sanctions hitting it in the wallet Cyber-crime03 Jun 2022 | 7
Clipminer rakes in $1.7m in crypto hijacking scam Crooks divert transactions to own wallets while running mining on the side Research03 Jun 2022 | 2
Super-spreader FluBot squashed by Europol Your package is delayed. Click this innocent-looking link to reschedule Research02 Jun 2022 | 5
Watch out for phishing emails that inject spyware trio You wait for one infection and then three come along at once Research01 Jun 2022 | 13
EnemyBot malware adds enterprise flaws to exploit arsenal Fast-evolving botnet targets critical VMware, F5 BIG-IP bugs, we're told Research01 Jun 2022 | 2
This Windows malware uses PowerShell to inject malicious extension into Chrome And that's a bit odd, says Red Canary Research27 May 2022 | 13
Ransomware encrypts files, demands three good deeds to restore data Shut up and take ... poor kids to KFC? Research26 May 2022 | 16
Cheers ransomware hits VMware ESXi systems Now we can say extortionware has jumped the shark Research26 May 2022 | 3
It's 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017 Crafty file names, encrypted malicious code, Office flaws – ah, it's like the Before Times Research24 May 2022 | 23
Your snoozing iOS 15 iPhone may actually be sleeping with one antenna open No, you're not really gonna be hacked. But you may be surprised Research19 May 2022 | 40
Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware Analysis Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D Research18 May 2022 | 3
Monero-mining botnet targets Windows, Linux web servers Sysrv-K malware infects unpatched tin, Microsoft warns Cyber-crime18 May 2022 | 10
Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner... We take a look at low, low subscription prices – not that we want to give anyone any ideas Research14 May 2022 | 6
To predict the targets of Chinese malware, look at the target of Chinese laws Black Hat Asia Around the time Beijing banned online gambling, RATs started targeting operators, say Taiwanese researchers Security13 May 2022 | 3
Anatomy of a campaign to inject JavaScript into compromised WordPress sites Reverse-engineered code redirects visitors to dodgy corners of the internet Research13 May 2022 | 8
APT gang 'Sidewinder' goes on two-year attack spree across Asia Black Hat Asia Launches almost 1,000 raids, plenty with upgraded malware Security12 May 2022 |