Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware

Read more

We Can Neither Regulate Nor Sanction Away Cryptocurrency’s Facilitation of Ransomware

Interesting article from ISACA. If you are interested to learn what happen to the Colonial pipeline ransomware attack. This is

Read more

New zero-day in the Log4j Java library is already being exploited

A newly discovered zero-day vulnerability in the widely used Java logging library Apache Log4j is easy to exploit and enables

Read more

DDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison

A federal jury in California, at the end of a nine-day trial, found an Illinois man guilty, who have operated

Read more

Cyber arms dealer exploits new iPhone software vulnerability

A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that

Read more

Hackers Shift from Malware to Credential Hijacking

Adversaries are relying less on malware to conduct attacks that are consequently more difficult to detect, according to an annual

Read more

Diversify ‘homogenous’ US cybersecurity workforce

A group of experts across multiple fields on Thursday recommended a sweeping set of actions to diversify the U.S. cybersecurity

Read more