fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released

LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released

The U.K. National Crime Agency (NCA) on Tuesday confirmed that it obtained LockBit’s source code as well as a wealth of intelligence pertaining to its activities and their affiliates as part of a dedicated task force called Operation Cronos . “Some of the data on LockBit’s systems belonged to victims who had paid a ransom […]

LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released Read More »

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days - Help Net Security

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days – Help Net Security

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Integrating cybersecurity into vehicle design and manufacturing In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days – Help Net Security Read More »

Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data

Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data

The hackers, infamously known as IntelBroker and Sanggiero, claim to possess a trove of data from Robert Half, which is being sold for $20,000 in Monero (XMR) cryptocurrency. In June 2022, Robert Half International Inc., a global staffing and business consulting service, filed a data breach notification with the Office of the Maine Attorney General.

Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data Read More »

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge - Help Net Security

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge – Help Net Security

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge The essence of cybersecurity is not just about defense but enabling business through trust and reliability. As Gmail and Yahoo take steps to enforce stricter email authentication, organizations that are proactive in their DMARC compliance will not only enhance their security posture but

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge – Help Net Security Read More »

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks - Help Net Security

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks – Help Net Security

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks Cyberint is unveiling its latest contribution to the infosec community: Ransomania. This free-to-use web application gives users access to a complete repository of ransomware data gathered by the Cyberint Research Team, empowering organizations to combat ransomware with efficiency and collaboration, with the tool making data

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks – Help Net Security Read More »

U.S. Government Disrupts Russia-Linked Botnet Engaged in Cyber Espionage

U.S. Government Disrupts Russia-Linked Botnet Engaged in Cyber Espionage

The U.S. government on Thursday said it disrupted a botnet comprising hundreds of small office and home office (SOHO) routers in the country that was put to use by the Russia-linked APT28 actor to conceal its malicious activities. “These crimes included vast spear-phishing and similar credential harvesting campaigns against targets of intelligence interest to the

U.S. Government Disrupts Russia-Linked Botnet Engaged in Cyber Espionage Read More »

North Korea and Iran using AI for hacking, Microsoft says

North Korea and Iran using AI for hacking, Microsoft says

US adversaries – chiefly Iran and North Korea, and to a lesser extent Russia and China – are beginning to use generative artificial intelligence to mount or organize offensive cyber operations, Microsoft said on Wednesday. Microsoft said it detected and disrupted, in collaboration with business partner OpenAI, many threats that used or attempted to exploit

North Korea and Iran using AI for hacking, Microsoft says Read More »

US Takes Down Notorious Warzone RAT Malware Operation, Arrests 2

US Takes Down Notorious Warzone RAT Malware Operation, Arrests 2

One suspect from Malta managed the Warzone Rat distribution network, while another from Nigeria developed and maintained the malware. In a major blow to cybercrime, the US Department of Justice, along with international partners and private companies, has dismantled the infrastructure behind the infamous Warzone RAT malware. Two individuals believed to be key players in

US Takes Down Notorious Warzone RAT Malware Operation, Arrests 2 Read More »

The future of cybersecurity: Anticipating changes with data analytics and automation - Help Net Security

The future of cybersecurity: Anticipating changes with data analytics and automation – Help Net Security

The future of cybersecurity: Anticipating changes with data analytics and automation In this Help Net Security interview, Mick Baccio, Staff Security Strategist at Splunk SURGe, discusses the future of cybersecurity, emphasizing the importance of data analytics and automation in addressing evolving threats. He points out the changes in threat tactics, the significance of automation in

The future of cybersecurity: Anticipating changes with data analytics and automation – Help Net Security Read More »

Scroll to Top