BlackMatter Ransomware

Note: this advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, version 9. See the ATT&CK for Enterprise for all

Read more

Ransomware Gangs Are Complaining That Other Crooks Are Stealing Their Ransoms

Cyber criminals using a ransomware-as-a-service scheme have been spotted complaining that the group they rent the malware from could be

Read more

100M IoT Devices Exposed By Zero-Day Bug

A high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more. A flaw in a widely used

Read more

How to Prevent Corporate Data Leaks in the Cloud

Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they

Read more

DDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison

A federal jury in California, at the end of a nine-day trial, found an Illinois man guilty, who have operated

Read more

New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more

Cyber arms dealer exploits new iPhone software vulnerability

A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that

Read more

North Korean Hacker Recently Employed Social Media to Launch a Cyberattack

North Korean hacking group Kumsong 121 has lately launched a series of cyberattacks that have taken advantage of social media

Read more

Hackers Shift from Malware to Credential Hijacking

Adversaries are relying less on malware to conduct attacks that are consequently more difficult to detect, according to an annual

Read more