North Korean Hackers Behind Horizon Bridge Hack: Report
The Lazarus Group a North Korean hacking group believed to be supported by the Kim regime – is likely behind last week’s hack of Harmony Bridge, acco... Read more
The Lazarus Group a North Korean hacking group believed to be supported by the Kim regime – is likely behind last week’s hack of Harmony Bridge, acco... Read more
On December 7, 2021, Google announced it was suing two Russian men allegedly responsible for operating the Glupteba botnet, a global malware mena... Read more
CISA warned today that threat actors, including state-backed hacking groups, are still targeting VMware Horizon and Unified Access Gateway (UAG) serv... Read more
The Israeli firm NSO Group told European lawmakers at least five EU countries have used its software and the firm has terminated at least one contrac... Read more
Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the “ RSOCKS ” botnet, a collection of million... Read more
Check out this handmade sign posted to the front door of a shuttered Jimmy John’s sandwich chain shop in Missouri last week. See if you can tell fr... Read more
Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including... Read more
Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming thei... Read more
A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying c... Read more
At the outset of their federal criminal trial for hijacking vast swaths of Internet addresses for use in large-scale email spam campaigns, three curr... Read more
Netflix has a new documentary series airing next week — “ Web of Make Believe: Death, Lies & the Internet ” — in which Yours Truly apparently has a... Read more
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law th... Read more