fbpx

Ransomware Attacks

Redefining the Threat Landscape: Ransomware Trends in 2024

Redefining the Threat Landscape: Ransomware Trends in 2024

Redefining the Threat Landscape: Ransomware Trends in 2024  The Rise of Backup and Disaster Recovery as the Final Bastion in Cybersecurity   As we sail through the cyber seas of 2024, the dark waters of ransomware continue to threaten the digital world. This year, we’re witnessing an unprecedented evolution in ransomware tactics, with groups scaling […]

Redefining the Threat Landscape: Ransomware Trends in 2024 Read More »

The 23andMe Data Breach Keeps Spiraling

The 23andMe Data Breach Keeps Spiraling

More details are emerging about a data breach the genetic testing company 23andMe first reported in October. But as the company shares more information, the situation is becoming even murkier and creating greater uncertainty for users attempting to understand the fallout. 23andMe said at the beginning of October that attackers had infiltrated some of its

The 23andMe Data Breach Keeps Spiraling Read More »

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber’s University Program is the only invite-only program designed to meet the needs of educational organizations that provide degrees/certifications in cybersecurity and offer not-for-profit security operations services. SAN JOSE, CA – December 4, 2023 – Today, Stellar Cyber , the innovator of Open XDR technology, announced the launch of its University Program – the

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program Read More »

ATTACHMENT DETAILS DALL·E-2023-12-10-09.17.16-An-illustration-of-a-nuclear-reactor-pool-during-refueling-showcasing-an-array-of-cylindrical-fuel-assemblies-submerged-in-water-casting-a-blue-glow.

Most Hazardous Nuclear Site | Cyber-Attack

Ministers are under pressure to explain the actions of the government and regulators over cybersecurity at Europe’s most hazardous nuclear site after a Guardian investigation revealed disturbing vulnerabilities in its networks. The shadow energy secretary, Ed Miliband, called on the government to urgently “provide assurances” about Sellafield, after the Guardian revealed it had been hacked

Most Hazardous Nuclear Site | Cyber-Attack Read More »

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards

Cyber Monday usually brings a ton of sales on every knick-knack and doodad you probably don’t need, but a lot of people work on a laptop. Snagging one of your favorites for a song is one of the best parts of this shopping holiday. You’ll rarely get a better chance to nab a new computer,

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards Read More »

Rhysida, the new ransomware gang behind British Library cyber-attack

A new name was added to the cyber-rogues’ gallery of ransomware gangs this week after a criminal group called Rhysida claimed responsibility for an attack on the British Library. The library confirmed that personal data stolen in a cyber-attack last month has appeared for sale online. While the name behind the attack might be relatively

Rhysida, the new ransomware gang behind British Library cyber-attack Read More »

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users

LummaC2 v4.0, an advanced malware, steals data and evades detection by employing trigonometry to distinguish human users from automated analysis tools. Security assessment platform provider Outpost24’s threat intelligence team KrakenLabs has uncovered a new technique that malware developers are using to evade detection in sandbox environments. This technique involves using trigonometry to analyze cursor movements

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users Read More »

Popular Dragon Touch Tablet for Kids Infected with Corejava Malware

Popular Dragon Touch Tablet for Kids Infected with Corejava Malware

The Dragon Touch KidzPad Y88X 10 tablet on Amazon, analyzed by EFF researchers, also comes with preinstalled riskware and an outdated parental control app called KIDOZ. Retailers like Amazon have played a significant role in popularizing low-cost Android devices for children. However, based on research conducted by the Electronic Frontier Foundation (EFF) on such devices,

Popular Dragon Touch Tablet for Kids Infected with Corejava Malware Read More »

Personal data stolen in British Library cyber-attack appears for sale online

Personal data stolen in British Library cyber-attack appears for sale online

The British Library has confirmed that personal data stolen in a cyber-attack has appeared online, apparently for sale to the highest bidder. The attack was carried out in October by a group known for such criminal activity, said the UK’s national library, which holds about 14m books and millions of other items. This week, Rhysida,

Personal data stolen in British Library cyber-attack appears for sale online Read More »

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon’s (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded the group as engaging in large-scale campaigns that are followed by

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks Read More »

Scroll to Top