Skip to content

Hacks

$10 million up for grabs in fight against North Korean hackers

The US State Department is offering a reward of up to $10 million for information that could help disrupt the activities of hackers, specifically those working on behalf of the North Korean government. These hackers are using cryptocurrency mixers to launder the cryptocurrency they are stealing from financial institutions and businesses. The North Korean regime… 

UK to block all Social Media Scams

Starting in May 2024, social media platforms operating in the United Kingdom have committed to combating a range of scams on their networks. This includes phishing schemes, cryptocurrency scams, and misleading advertisements, which will all face strict prohibition. Major platforms such as Facebook, Instagram, WhatsApp, and Twitter are obligated to adhere to these regulations or… 

Securing the Cloud: Strategies for CSPs to Mitigate Malware Hosting Risks

The rise of cloud computing has brought numerous benefits to businesses, but it has also attracted cyber-criminals who exploit cloud environments for hosting malware. Cloud Service Providers (CSPs) must take proactive measures to ensure the security of their infrastructure and clients’ data. Here are ten strategies that CSPs can implement to avoid hosting malware in… 

AI and Mass Spying – Schneier on Security

Title: AI and Mass Spying: The Era of Surveillance Reinvented Introduction: The convergence of artificial intelligence (AI) and mass spying is poised to revolutionize surveillance techniques. Traditionally, spying and surveillance have relied on human labor to gather and interpret information. However, advancements in AI technology have given rise to automated systems that can analyze vast… 

Thinking about a Career in Cloud Security? Follow this Path

As cybercriminals increasingly target critical data and assets in the cloud, organizations worldwide are in need of cloud security professionals who can effectively identify and mitigate security risks. This is especially challenging as many organizations operate under a multicloud strategy, utilizing multiple cloud service providers. To prepare for a career in cloud security, ISC2, the… 

Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale

When selling your old smartphone, it is important to take certain steps to protect your personal data and avoid potential cyber threats. Here are nine essential steps to follow: 1. Uninstall Banking Apps and Gateways: Before selling your device, uninstall any banking apps and UPI gateway apps to prevent any compromise of your banking applications.… 

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

The rise of the internet has enabled mass surveillance, with spying and surveillance becoming intertwined. While traditional surveillance required manual tracking, the digital era allows for bulk collection of data through our devices and online activities. AI technology is now advancing to enable mass spying, with the ability to summarize and organize vast amounts of… 

Russian hacker pleads guilty to Trickbot malware conspiracy

A Russian man, Vladimir Dunaev, has pleaded guilty to his involvement in the distribution and development of the notorious Trickbot malware. The US Department of Justice announced that Dunaev was an integral member of the criminal Trickbot group, known for its sophisticated information-stealing Trojan that defrauded innocent internet users for years. Trickbot stole sensitive data… 

Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware

Microsoft has issued a warning about the increasing prevalence of Cactus ransomware attacks disguised as the Danabot malvertising campaign. The main objective of these attacks is to steal sensitive information or facilitate the injection of additional harmful payloads. The hacking group known as Storm 0216, previously associated with the distribution of Qakbot malware, has now… 

Supply-chain ransomware attack causes outages at over 60 credit unions

Over sixty credit unions in the United States have been taken offline due to a ransomware attack on their technology provider, Trellance. Trellance is the parent company of FedComp, which offers software and services to credit unions. Ongoing Operations, a unit of Trellance specializing in disaster recovery and business recovery, was also affected. The attack,…