Recently, the Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world's largest and longest-running dark web market for illegal goods, drugs, and cybercrime services. The takedown is the result of a collaborative investigation with Ireland, the United Kingdom, and the United States that began towards the end of 2022, the disclosure reported. The marketplace discontinued its operations in late 2023 following reports of service disruptions and exit
All Articles (2549)
The Internet Archive has come back online, in slightly degraded mode, after repelling an 9 October DDoS attack and then succumbing to a raid on users' data. For several days after the attack, the Archive loaded into the basic page depicted below.
Currently, it is seen that the site sometimes load that page, but sometimes load another that's closer to the Archive's usual busy home page, but omits many items. It is unclear why the site is switching between the two (and yes, we cleared caches and
In today’s interconnected world, safeguarding critical infrastructure from cyber threats is more important than ever. The continuous evolution of technology and the adoption of the Connected Worker have created unprecedented opportunities for growth and innovation. However, they have also created a vast and complex digital landscape where vulnerabilities can be easily exploited. The cybersecurity challenges facing critical infrastructure are not hypothetical; they are stark realities that can
A new attack technique that relies on radio signals from memory buses to exfiltrate data from air-gapped systems has been identified. The exploit is a novel side-channel attack that has been found to leverage radio signals emanated by a device's Random Access Memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks. Air-gapped systems, typically used in mission-critical environments with exceptionally high-security requirements, such as governments, weapon systems,
The US election cycle is here, and it is becoming more important for voters not to be fooled by Deepfakes. According to recent research, just over half of Britons surveyed (53%) either have not heard of the term Deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them. Meanwhile, two in five have encountered at least one deepfake in the past six months, as recent reports reveal that over 4k celebrities have fallen victim to Deepfakes, and 400 di
Some television stations and websites in Russia are offline for the second day in a row following what Moscow called an “unprecedented” attack on its digital infrastructure. The disruption began on October 7, Russian President Vladimir Putin’s birthday. Last week, Russian state-owned broadcaster VGTRK’s website and digital streaming services went off the air. The affected outlets included radio stations and TV channels such as Russia-1 and Russia-24. “Our state media holding, one of the larg
It is not the federal government that’s responsible for the cyber defense of critical infrastructure. The responsibility falls on the critical infrastructure operators themselves and most aren’t equipped for the fight. Cyber threats to the United States' critical infrastructure are on the rise. On 31 January 2024, FBI Director Christopher Wray testified before Congress, highlighting how Chinese government hackers are attempting “‘to find and prepare to destroy or degrade the civilian critical
Despite current of law enforcement action to take down ransomware gangs, Secureworks has observed a 30% year-on-year rise in active ransomware groups. In the eighth edition of the Secureworks annual State of The Threat Report[1], the firm identified 31 new groups that had entered the ransomware ecosystem in the last 12 months. The report noted that while a few big players had previously dominated the threat landscape, it is now home to a broader set of emerging entities.[2]
The top four most
In today’s world, cars are not just machines that take us from one place to another. They have transformed computers into wheels, packed with technology for navigation, entertainment, and safety. However, this technology also comes with a dark side: cyber-attacks. As vehicles become more connected through the Internet of Things (IoT), they are increasingly vulnerable to hackers. Understanding how these attacks happen, and their potential consequences is crucial in our technologically advanced
With new rules on Cyber Security coming down from the US Coast Guard, Angeliki Zisimatou, Director Cybersecurity, ABS, is uniquely positioned to discuss maritime cyber security in the round, with insights on what she’s seen and heard from the draft rules, with advice on what it could mean for vessel owners. Cyber security and all that it entails is quickly climbing the priority ladder in maritime, as increasing dependance on connectivity is a double edge sword of promise and peril. While the l
Earlier this week, a US federal judge ordered Google to tear down the digital walls shielding its Android app store from competition as punishment for maintaining an illegal monopoly that helped expand the company's internet empire. The injunction was issued by US District Judge James Donato and will require Google to make several changes that the California company had been resisting. Those include a provision that will require its Play Store for Android apps to distribute rival third-party a
The 2024 Nobel Prize in physics has been awarded to John Hopfield and Geoffrey Hinton for their fundamental discoveries in machine learning, which paved the way for how artificial intelligence is used today.
Hopfield, a professor at Princeton University and Hinton, a computer scientist at the University of Toronto, were praised for laying the foundations for the machine learning that powers many of today’s AI-based products and applications. Hinton, however, has also expressed fears about AI’s
Automating the on-demand collection of memory dumps, process information, system files, and event logs for inclusion in threat-hunting activities allows for a more comprehensive and proactive approach to adaptive threat-hunting. In the WatchTower Threat Hunting blog series, Sentinel Labs calls out some adaptive threat-hunting methodologies, including Chained Detections, a Multi-Directional Approach, and AI-powered hunts. This shows the benefits of applying a multi-directional approach to adaptiv
Cyber risks continue to expand across industries, and as ships and boats at sea increasingly become connected to the shore in the name of crew welfare and operational efficiency, so too grow the risks that a ship could be hacked, the safety of its crew and cargo compromised. “Cyber risk is real, it's really growing substantially, especially with increased concerns around geopolitical tensions, which is having a direct impact on maritime operations,” said Cedric Warde, Vice President, at Digital
If you’re an Old Trekkie like me, this will be interesting. MIT has created a chip-based optical tractor beam that can focus a penetrating beam of light over 5 millimeters away from the surface of the chip itself. That might not sound like much, but it's a game-changer compared to previous integrated "optical tweezers" that could only work within a few microns of the chip. Those older approaches had to remove cells from their sterile glass containers (commonly used for biological experiments)
China-linked APT group Salt Typhoon (FamousSparrow and GhostEmperor) breached US broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data.
See: https://redskyalliance.org/xindustry/hotels-under-attack
According to the Wall Street Journal, which reported the news exclusively, the security breach poses a major national security risk. The WSJ states that the compromise remained undisclosed due to possible impact on na
In a feat that seemed unachievable just a few short years ago, an international research consortium has recently unveiled the first complete wiring diagram of an entire fruit fly brain. The map itself is accompanied by a cache of papers, demonstrating how this breakthrough is already leading to new scientific findings and there’s much more to come.
Why do we need brain maps anyway? Maps that show every neuron in a brain and all the myriad connections between them are called connectomes. The fi
Your smartphone can be hit by various security threats, from phishing to malware to spyware. All it takes is one successful attack to take over your phone, compromise your data, and even steal your identity. How do you protect yourself? In a Mobile Device Best Practices report,[1] the National Security Agency (NSA) suggests tips designed to thwart hackers and attackers from assaulting your mobile device. One method is as simple as turning your phone off and on.
Spearphishing attacks can target
An extortionist armed with a new variant of MedusaLocker ransomware has infected more than 100 organizations a month since at least 2022, according to Cisco Talos, which recently discovered a "substantial" Windows credential data dump that sheds light on the criminal and their victims. The miscreant, whom Talos calls "PaidMemes," uses a recent MedusaLocker variant called "BabyLockerKZ," and inserts the words "paid_memes" into the malware plus other tools used during the attacks.
Recent research
I recently saw the title of a Recorded Future podcast regarding AI and police reporting. I have 28 years of law enforcement experience, 8 years as a uniformed police officer and this title really intrigued me. So I watched the segment: AI is Writing Police Reports, Should We be Worried?[1]
The story starts with police body cams, which began somewhat experimentally in 2011 and now has gain acceptance throughout US policing. The main purpose of demanding police wear body cams was to change po