All Articles (2360)

Sort by

13456939680?profile=RESIZE_400xA roster of officials from government, academia and industry gathered in Munich Germany at a Security and Cyber Security Conference to discuss how future workforces must marry the power of artificial intelligence with expertise only a human can provide.  “Looking at the next generation of national security professionals, I want policy people who can code and coders who can do policy,” said the former head of the National Security Agency (NSA) General Paul Nakasone at the Munich Cyber Security Co

13459031460?profile=RESIZE_400xBroadcom researchers recently reported that threat actors behind an RA World ransomware attack against an Asian software and services firm employed a tool that was explosively associated in the past with China-linked APT groups. “Tools that are usually associated with China-based espionage actors were recently deployed in an attack involving the RA World ransomware against an Asian software and services company,” reads the report published by Broadcom.

During the late 2024 attack, the attacker d

13454758480?profile=RESIZE_400xThere have been many movie or TV shows that depict US Presidents.  A new Netflix series is soon to be released dealing with cyber-security.  Netflix has recently released the trailer for its new limited series “Zero Day,” which features an ensemble cast of Robert De Niro, Jesse Plemons, Lizzy Caplan, Connie Britton, Joan Allen, Matthew Modine and Angela Bassett.  The six-episode technical thriller hits the streamer on 20 February 2025.[1] 

According to an official logline, “Zero Day” follows “Ro

13453768690?profile=RESIZE_400xSpanish National Police arrested a hacker responsible for multiple cyberattacks on government institutions in Spain, and the US Targets included the US Army, UN, NATO, and other agencies. Some of the breached organizations were the US Army, the United Nations, the International Civil Aviation Organization, the North Atlantic Treaty Organization, and multiple Spanish government agencies. “The suspect, who claimed responsibility for the intrusions into dark web forums, managed to access the comput

13453722279?profile=RESIZE_400xCybercriminals are abusing a weakness in ASP.NET websites to remotely execute malicious code, according to Microsoft’s Threat Intelligence team, which has published an in-depth analysis of the new method.  In the article, Microsoft explained threat actors were injecting malicious code through a method called ViewState code injection attacks.

ViewState is a feature in ASP.NET websites that helps remember user input and page settings when the page is refreshed. It stores this information in a hidd

13453089062?profile=RESIZE_400xOld media newspaper companies have long been feeling the negative effects of the new cyber age.  Currently, a cyberattack is impacting on the availability of newspapers belonging to Lee Enterprises, one of the largest owners of local papers in the US.  The company told Recorded Future News it is “working through technology issues that caused some disruption” to the company’s day-to-day work.  “Our technology response team has been working with third-party specialists to fully restore our systems

13453772276?profile=RESIZE_400xTwo weeks ago, Apple pushed a signature update to its on-device malware tool XProtect to block several variants of what it called the macOS Ferret family: FROSTYFERRET_UI, FRIENDLYFERRET_SECD, and MULTI_FROSTYFERRET_CMDCODES. This DPRK-attributed malware family was first described by researchers in December and further in early January and identified as part of the North Korean Contagious Interview campaign, in which threat actors lure targets to install malware through the job interview process

13453766674?profile=RESIZE_400xThe United States is taking a firm stance against potential cybersecurity threats from artificial intelligence (AI) applications with direct ties to foreign adversaries. On 6 February 2025, US Representatives Josh Gottheimer (D-NJ) and Darin LaHood (R-IL) introduced the bipartisan No DeepSeek on Government Devices Act, which seeks to prohibit federal employees from using the AI-powered application DeepSeek on government-issued devices.

See: https://redskyalliance.org/xindustry/deepseek-or-deepfa

13452756465?profile=RESIZE_180x180The New York Blood Center (NYBC) said it suffered a ransomware attack that disrupted operations and forced it to reschedule some operations.  NYBC is one of the largest independent blood collection and distribution organizations.  It collects about 4,000 units of blood products daily and serves more than 75 million people at over 200 hospitals across the Northeast and 500 nationwide.  The cyber incident occurred while the blood center was already facing a critical shortage due to a decline in th

13450849091?profile=RESIZE_400xComputers need electricity.  Without electricity, a country will effectively shut down.  In the near future EstoniaLatvia, and Lithuania will be officially severing their remaining electricity grid connections with Russia and Belarus, marking a significant step in their move away from Moscow’s influence nearly 35 years after leaving the Soviet Union.

This symbolic move, laden with geopolitical significance, accelerates a process that gained momentum following Russia’s invasion of Ukraine.  “Th

13452705690?profile=RESIZE_400xIn a significant victory against cybercrime, US and Dutch law enforcement agencies have dismantled 39 domains and their associated servers to disrupt a Pakistan-based network of online marketplaces selling phishing and fraud-enabling tools. The coordinated effort was titled Operation Heart Blocker, which targeted a cybercriminal group known as Saim Raza, also operating under the name HeartSender.

According to the US Department of Justice (DOJ), the seized domains actively facilitate the sale of

13450320484?profile=RESIZE_400xA Russian hacking campaign has exploited a vulnerability in a popular file archiver to infect Ukrainian government and private organizations with SmokeLoader malware, researchers have found.

The bug, tracked as CVE-2025-0411, was discovered in 7-Zip, a free and open-source file archiver developed by Russian programmer Igor Pavlov.  It was identified by researchers at Tokyo-based cybersecurity firm Trend Micro in September and patched two months later, giving hackers ample time to exploit it in t

13450392294?profile=RESIZE_400xShortly after taking office, Donald Trump touted a new private business venture, led by OpenAI, which plans to spend half a trillion dollars over the next four years building the data centers and power production plants that America’s growing AI industry relies on.  “It’s big money and high-quality people,” Trump said during a January 21st press announcement alongside Sam Altman from OpenAI, Larry Ellison from Oracle, and Masayoshi Son from SoftBank.  The project is “a resounding declaration of

13450017701?profile=RESIZE_400xVolt.  Flax.  Salt.  Many typhoons have emerged in the last year and aren’t strictly related to the weather.  But, like their meteorological namesakes, they do cause catastrophic damage.  These typhoons are high-profile state-sponsored cyberattacks.  Recent incidents include exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet Service Providers (ISPs), to directly attack Singapore Telecommunications, representing part of ongoing cyberattacks against glo

13450347090?profile=RESIZE_400xEnterprise cybersecurity tools, such as routers, firewalls, and VPNs, exist to protect corporate networks from intruders and malicious hackers, something that is particularly important in today’s age of widespread remote and hybrid working. But while pitched as tools that help organizations stay safe from outside threats, many of these products have time and again been found to contain software bugs that allow malicious hackers to compromise the very networks these products were designed to prot

13445448662?profile=RESIZE_400xAn electric utility serving multiple counties in Mississippi was attacked by cybercriminals last summer in an incident that exposed information of more than 20,000 residents.  The Yazoo Valley Electric Power Association initially warned customers through social media on 26 August 2024 that, due to software problems, they were unable to process payments.  The system was restored by 30 August.

In breach notification letters filed with regulators last week, the utility confirmed it discovered “susp

13445393491?profile=RESIZE_400xChinese car brands are gaining an increasing stronghold on Britain's car market - but older drivers remain skeptical over concerns about privacy risk, market research says. Registrations figures for 2024 show a 14% increase in sales of models from the four major Chinese brands now available in the UK: BYD, MG, Omoda and Ora.  These made up 5% of all new cars bought in Britain last year, representing almost 100,000 motors entering the road.

Many of these are electric vehicles as China continues t

13445298865?profile=RESIZE_400xThe United States Coast Guard (USCG) published its final rule to introduce cybersecurity requirements for US-flagged vessels, along with port/terminal facilities and outer continental shelf facilities.

The rule takes effect from 16 July 2025 and will commence a 24-month period to achieve full compliance with the standards required in the rule.[1]

Key points:

  • It applies only to US-flagged vessels that must comply with 33 CFR Part 104, for example cargo ships greater than 100 gross tons.
  • From 16

13444208256?profile=RESIZE_400xThreat actors have been observed concealing malicious code in images to deliver malware, such as VIP Keylogger and 0bj3ctivity Stealer, as part of separate campaigns. In both campaigns, attackers hid malicious code in photos uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads. The starting point is a phishing email that masquerades as invoices and purchase orders to trick recipients into opening malicious attachments, such as Microsoft

13444173482?profile=RESIZE_400xThe US Cybersecurity and Infrastructure Security Agency (CISA) has warned federal agencies about three flaws allowing hackers to use Mitel MiCollab and Oracle WebLogic Server on its Known Exploited Vulnerabilities catalog (KEV). This security defect will enable attackers to perform unauthorized administrative actions and access user and network information.

Currently, there is no information on how these flaws are exploited in real-world attacks, who may be exploiting them, or the targets of th