Russia Pivots, Cracks Down on Resident Hackers – Dark Reading
Thanks to improving cybersecurity and law enforcement action from the West, Russia’s government is reevaluating which cybercriminals it wants to give safe haven from the law. – Read More
Thanks to improving cybersecurity and law enforcement action from the West, Russia’s government is reevaluating which cybercriminals it wants to give safe haven from the law. – Read More
The Iranian threat group is using a compromised mailbox accessed through NordVPN to send phishing emails that prompt recipients to enable macros. – Read More
People habitually ignore cybersecurity on their phones. Instead of compensating for that, organizations are falling into the very same trap, even though available security options could cut smishing success and…
After a particularly gruesome murder, South Korea issues “code black” travel ban for several regions in Cambodia, while other nations urge more raids. – Read More
Interference with the global positioning system (GPS) isn’t just a problem for airlines, but for shipping, trucking, car navigation, agriculture, and even the financial sector. – Read More
Fraudsters are using generative AI to generate fake music and boost the popularity of the fake content. – Read More
A persistent cyber espionage campaign focused on SQL servers is targeting government, industrial and financial sectors across Asia, Africa, and Latin America. – Read More
The Russia-backed threat actor’s latest cyber spying campaign is a classic example of how quickly sophisticated hacking groups can pivot when exposed. – Read More
The operation took down a massive SIM card fraud network that provided fake phone numbers from more than 80 countries to criminals. – Read More
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. – Read More
Oracle E-Business Suite customers received conflicting deployment guidance, leaving enterprises exposed a recent zero-day flaw, Andrew argues. – Read More
“FD-SOI” makes hardware attacks on silicon chips more difficult. And, researchers argue, it’ll help OEMs with regulatory compliance. – Read More
The sophisticated worm — which uses invisible code to steal credentials and turn developer systems into criminal proxies — has so far infected nearly 36k machines. – Read More
Aliyu Ibrahim Usman, founder of the Cyber Cadet Academy in Nigeria, shares his passion for raising cybersecurity awareness in the wake of mounting security concerns worldwide. – Read More
Microsoft revoked more than 200 digital certificates that threat actors used to sign fake Teams binaries that set the stage for Rhysida ransomware attacks. – Read More