Iranian hackers used Log4Shell to penetrate the network of an unnamed federal agency where they stole passwords and implanted cryptocurrency mining software. Whether the Iranians were acting wholly on Tehran's behalf, on their own behalf, or both, is uncertain.
Pro-Kremlin hackers claimed credit for a denial-of-service attack against FBI websites, marking the latest in a series of nuisance attacks. The FBI earlier said it is aware of "pro-Russian hacktivist groups employing DDoS attacks to target critical infrastructure companies with limited success."
Russian hackers have a campaign to maliciously encrypt files of Ukrainian victims. But unlike other ransomware groups, they are doing so without the possibility of offering a decryptor. Ukraine’s Computer Emergency Response Team identifies the group as UAC-0118, also known as From Russia with Love.
Hacktivists fighting a proxy online battle against Russia after its invasion of Ukraine claim to have dumped online a trove of files from the Central Bank of Russia. The IT Army of Ukraine also claimed to have disrupted payments processing at Moscow's Alfa Bank.
The Red Cross symbol has marked people and facilities off-limits to attack across a century of wars, but security experts are skeptical about a proposal to create a digital Red Cross marker to protect healthcare and humanitarian groups from cyberattacks. The reason? You can't trust cybercriminals.
In this episode of "Cybersecurity Unplugged," Dr. Chris Miller, an associate professor of international history at the Fletcher School at Tufts University, discusses the cybersecurity aspects of the Russia-Ukraine war and how perceptions of the two countries may have been inaccurate.
A Dutch member of the European Parliament accused the European Union of weakness in the face of a threat to democracy posed by advanced spyware apps such as the NSO Group's Pegasus. Sophie in ’t Veld called for a moratorium on such apps and for a supranational crackdown.
The healthcare industry should be aware of Iranian hackers using social engineering techniques, says the U.S. federal government. Hackers sponsored by Tehran layer on the social media deception, warns the Department of Health and Human Services' Health Sector Cybersecurity Coordinating Center.
It's been a year since Beijing imposed regulations requiring disclosure to authorities of vulnerabilities - a period that correlated with an uptick in zero-day exploitation by Chinese state-backed hackers, says computing giant Microsoft. China is likely stockpiling and weaponizing the disclosures.
SolarWinds, maker of network management software famously hacked by the Russian government, may be the subject of an investigation by the U.S. Securities and Exchange Commission after staff made a preliminary determination in its favor. The company says it will contest the staff recommendation.
Operational technology will gain more malicious attention from state-backed hackers, warns the European Union Agency for Cybersecurity. Geopolitics is driving changes in the threat landscape and the agency predicts retaliatory attacks for Western support of Kyiv.
All employees should consider upholding the security of the organization part of their job regardless of their official role at the company, says Equifax Business Information Security Officer Michael Owens. But creating an organization-wide cybersecurity culture is easier said than done.
North Korean state hacking group Kimsuky is developing Android malware targeted at South Korean users by disguising the apps as legitimate apps including a Google security plug-in and a document viewer. Seoul-based cybersecurity company S2W dubs the apps FastFire, FastSpy and FastViewer.
Parliament IT systems in two East European capitals were disrupted Thursday. The Poland Senate said a distributed denial-of-service attack partially originated from inside Russia. In Slovakia, a Parliament speaker postponed voting after telling lawmakers that vote-counting systems were not working.
The problem of zero-day exploits used by advanced spyware makers such as NSO Group is an urgent problem requiring government intervention, a Google cybersecurity executive told the European Parliament committee investigating member nations' use of the Pegasus spy app.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.