DoJ sought administrative penalties for whistleblowers

DoJ sought administrative penalties for whistleblowers

Documents declassified on Tuesday reveal that the Justice Department aggressively sought to impose administrative penalties on whistleblowers, rather than pursue criminal penalties.

272 million email account credentials found on the dark web

272 million email account credentials found on the dark web

Hold Security reported that one of its researchers discovered, and then acquired, a mega-size load of 272 million stolen email credentials from a hacker.

Not a Pretty Picture: ImageMagick flaw enables remote code execution via uploaded images

Not a Pretty Picture: ImageMagick flaw enables remote code execution via uploaded images

Open-source image processing software provider ImageMagick has issued patches and workarounds for a series of recently disclosed vulnerabilities, including one that could allow hackers to remotely execute code via the uploading of maliciously crafted images.

Researchers ID 'Infy,' Iranian malware family under the radar for a decade

Researchers ID 'Infy,' Iranian malware family under the radar for a decade

Palo Alto researchers spotted an Iranian malware family, dubbed Infy, used in targeted attacks for nearly a decade under the radar.

Localized "designer" malware campaigns all the rage, says Sophos

Localized "designer" malware campaigns all the rage, says Sophos

Criminal outfits are increasingly distributing "designer" spam and malware, customized to optimally target victims in specific geographic regions, according to new research from Sophos' research division, SophosLabs.

Some U.S. Bancorp workers' W-2 info exposed in ADP data breach

Some U.S. Bancorp workers' W-2 info exposed in ADP data breach

At least one major corporation that uses ADP as its payroll vendor had some of its employees W-2 tax information compromised.

Google patches 40 Android security flaws

Google patches 40 Android security flaws

Google released patches for 40 security vulnerabilities affecting Android devices. Vulnerabilities include remote code execution, elevated privilege, and remote denial of service (DoS) flaws.

Gozi malware creator cuts deal, gets time served and $7M fine

Gozi malware creator cuts deal, gets time served and $7M fine

Gozi banking malware creator Nikita Kuzmin sentenced to time served and a $7 million fine as the U.S. Attorney's office tells judge Kuzmin provided "substantial assistance" to the government.

Action Fraud warns of new wave of Lizard Squad DDoS attacks

Action Fraud warns of new wave of Lizard Squad DDoS attacks

Lizard Squad is back with a vengeance, according to an advisory from Action Fraud UK which is advising organisations to report the attacks, keep detailed records and seek help from their ISPs.

Microsoft expands bug bounty program to Nano Server

Microsoft expands bug bounty program to Nano Server

Microsoft continues to expand its bug bounty program, announcing it will pay up to $15,000 for vulnerabilities found in Nano Server.

Court decisions erode Privacy Shield support

Court decisions erode Privacy Shield support

The long-besieged Privacy Shield agreement proposed by U.S. and European officials faces a new round of challenges following recent decisions by the U.S. Foreign Surveillance Intelligence Court and the Supreme Court.

Market forces: Supply and demand

Market forces: Supply and demand

The market, not government regulation, will push IoT security to a higher standard, says John Ellis of Ellis & Associates.

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.

Judge compels woman to provide fingerprint to open Apple iPhone

Judge compels woman to provide fingerprint to open Apple iPhone

The FBI recently pressed for a 29-year-old Los Angeles woman to provide her fingerprint to open her phone after she was sentenced in an identity theft case.

Pwnedlist vulnerability exposed 866M accounts

Pwnedlist vulnerability exposed 866M accounts

A Michigan school district network engineer discovered a security vulnerability affecting the pwnedlist.com service that exposed 866 million account credentials.

Mobile devices still vulnerable to attack, report

Mobile devices still vulnerable to attack, report

Mobile attacks can workaround two-factor authentication on Android phones and inject malware onto iOS phones.

Bernie Sanders drops DNC suit after probe confirms campaign's claims

Bernie Sanders drops DNC suit after probe confirms campaign's claims

After an investigation confirmed that data was exported during a December breach of the DNC voter file system but cleared the Sanders campaign of wrongdoing, the presidential hopeful withdrew a lawsuit it had filed against the DNC.

Botnets getting bigger and stronger, says Kaspersky

Botnets getting bigger and stronger, says Kaspersky

Botnets are getting bigger and DDoS attacks more frequent according to Kaspersky

First Choice Credit Union files class-action suit against Wendy's over breach

First Choice Credit Union files class-action suit against Wendy's over breach

Claiming that Wendy's didn't properly protect data, First Choice Credit Union filed a class action lawsuit against the retailer over a breach experienced last year.

Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts

Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts

Minutes before the NFL Draft commenced on Thursday night, an apparent hacker accessed the Twitter account of top prospect Laremy Tunsil and posted an old video of the Ole Miss player smoking from a bong, damaging his value.

Researchers spot mobile malware competition on the black market

Researchers spot mobile malware competition on the black market

IBM security researchers have spotted an uptick in mobile malware competition in pricing, features and quality on the black market.

Judge ruled go ahead for claims of phone hacking against UK tabloid

Judge ruled go ahead for claims of phone hacking against UK tabloid

High Court judge Mr. Justice Mann has ruled the go ahead for claims against The Sun newspaper for phone hacking.

CryptXXX ransomware being served by toy company site

CryptXXX ransomware being served by toy company site

The day after security researchers discovered the website for toy maker Maisto was not only selling radio-controlled cars and planes, but was also pushing CryptXXX ransomware, the site was down for maintenance.

Prognosis Negative for American Dental Association

Prognosis Negative for American Dental Association

Malware embedded on a USB drive was delivered to members of the American Dental Association (ADA).

Marcher banking malware hitting Australia

Marcher banking malware hitting Australia

Marcher Madness continues with a new, stealthier iteration of the Marcher banking malware targeting Android users in Australia.

Belgian minister of defence stresses investing in cyber-security

Belgian minister of defence stresses investing in cyber-security

Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.

Turkish fascists claim responsibility for Qatar bank data breach

Turkish fascists claim responsibility for Qatar bank data breach

Qatar National bank has had 1.4 GB of internal files published online including the names of intelligence agents, government departments and the Qatari royal family. A turkish fascist group has claimed responsibility.

Mining company's data is more valuable than gold

Mining company's data is more valuable than gold

Hackers reportedly posted employee data and private documents belonging to a publicly listed gold-mining company on a paste site.

PCI DSS version 3.2 release extends multifactor authentication requirement

PCI DSS version 3.2 release extends multifactor authentication requirement

The PCI Data Security Standard version 3.2 released Thursday not only includes new requirements to safeguard payment data, including multifactor authentication.

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. Chief Information Officer Tony Scott Tuesday hinted his office may be working to help guide federal agencies to adopt "bimodal IT."

Attackers exploit MS Windows 'God Mode' for evil ends

Attackers exploit MS Windows 'God Mode' for evil ends

It appears that the developer mode of MS Windows, otherwise known as 'God Mode', is being leveraged by attackers to hide malware.

Senate committee leaders ask OMB to update 15-year-old cyber policy

Senate committee leaders ask OMB to update 15-year-old cyber policy

In a letter to the OMB, Senate Homeland Security Committee Chairman Ron Johnson and ranking member Tom Carper asked the agency's director Shaun Donovan to complete changes to a privacy and cyber policy framework.

Singtel opens unique cyber-security institute in Asia-Pacific

Singtel opens unique cyber-security institute in Asia-Pacific

Singapore Telecommunications (Singtel) has opened a new facility to help enterprises enhance cyber-security skills and test their networks in dealing with cyber-threats.

RSA Summit: Gibson urges information sharing to beat ransomware

RSA Summit: Gibson urges information sharing to beat ransomware

The director of CERT UK laid out some of the problems facing UK cyber-space and outlined what cyber-security could do to help fix them.

37% of Brits share personal login details with friends or partners

37% of Brits share personal login details with friends or partners

Over 10 percent of the UK population has pretended to be someone else online by snooping or sending messages through someone else's social media or email accounts without their permission.

Estonian man sentenced to 87 months for perpetrating click-fraud scheme

Estonian man sentenced to 87 months for perpetrating click-fraud scheme

A Manhattan federal court judge sentenced Estonian Vladimir Tsastsin to 87 months in prison for his role in perpetrating an internet fraud scheme that infected more than four million computers in more than 100 countries.

Windows XP and USB ports making cash machine vulnerable to attack

Windows XP and USB ports making cash machine vulnerable to attack

According to Kaspersky, ATMs are far easier to get into that one might think.

Uniting pro-ISIS hacking groups still unsophisticated, but sharpening skills, report says

Uniting pro-ISIS hacking groups still unsophisticated, but sharpening skills, report says

Pro-ISIS hacking groups joining forces behind a super-hacker team, the United Cyber Caliphate, are sharpening their skills and showing a willingness to coordinate and amp up cyberattacks, a new report revealed.

New site on dark web offering one-stop ransom services

New site on dark web offering one-stop ransom services

A new site was discovered on the dark web that allows hackers to upload stolen data and sell the data to criminals or criminal groups.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

Researchers create imaginary mobile devices to deceive Waze, other location-based apps

Researchers create imaginary mobile devices to deceive Waze, other location-based apps

Researchers from the University of California, Santa Barbara have uncovered a hacking technique that could allow bad actors to sabotage location-based mobile apps by simulating large number of devices that don't actually exist.

House passes EPA in unanimous vote

House passes EPA in unanimous vote

The House Wednesday passed the Email Privacy Act (EPA) 419-0, a reformation of the aging Electronics Privacy Act (ECPA) and drew immediate praise from rights groups.

PLATINUM gang exploited Microsoft 'hotpatching' support to mask activities

PLATINUM gang exploited Microsoft 'hotpatching' support to mask activities

The PLATINUM team has "gone to great lengths" over many years "to develop covert techniques" so their cyber-espionage campaigns will evade detection, even using Windows's support for "hotpatching" against it.

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

The Federal Bureau of Investigation won't share the method that was used to unlock an iPhone 5c used by one of the San Bernardino shooters because the mechanism belongs to the third party who cracked the phone.

Over 7M Minecraft mobile credentials exposed after Lifeboat data breach

Over 7M Minecraft mobile credentials exposed after Lifeboat data breach

Lifeboat Network, which runs servers for Minecraft Pocket Edition — the smartphone version of the immensely popular video game Minecraft — was hacked in January 2016, resulting in a data breach compromising 7 million-plus gamers.

Malware in nuclear power plant prompts plant shutdown

Malware in nuclear power plant prompts plant shutdown

Malware discovered at a nuclear power plant in Germany prompted RWE AG to shut down the power plant as a precaution.

UK public approve of Investigatory Powers Bill 'in spirit'

UK public approve of Investigatory Powers Bill 'in spirit'

Though deeply unpopular in some circles, a new YouGov poll has shown broad approval for the enumeration of government surveillance powers in the Investigatory Powers Bill.

SWIFT confirms additional cyberattacks on its messaging system

SWIFT confirms additional cyberattacks on its messaging system

The financial messaging organization SWIFT has issued a warning to its customers stating its system has undergone repeated attacks similar to those that lead to $81 million from a Bangladesh bank.

CyberCenturion crown goes to team from Gibraltar

CyberCenturion crown goes to team from Gibraltar

A team from Gibraltar won the final round of the CyberCenturion 2016 competition held at Bletchley Park's National Museum of Computing today.

73% of global brands and organisations hit with DDoS attack in 2015

73% of global brands and organisations hit with DDoS attack in 2015

With the bombardment of DDoS attacks fairly consistent worldwide throughout 2015, it's no longer a matter of if or when attacks might happen, but how often and how long the attack will last.

Locky ransomware spotted using Javascript downloader

Locky ransomware spotted using Javascript downloader

FireEye researchers observed a Locky ransomware campaign that used Javascript downloaders to infect users rather than macro- or binary-based downloaders.

Retailers believe breach detection is sufficient, but gap yawns wide

Retailers believe breach detection is sufficient, but gap yawns wide

Retailers believe they can detect a data breach in a week or less, a new survey commissioned by Tripwire revealed, while another report by Arbor Network showed it takes them on average 197 days to spot advanced threats.

Info on 1.2M BeautifulPeople.com users sold on dark web after breach

Info on 1.2M BeautifulPeople.com users sold on dark web after breach

The personal information of 1.2 million members of the "exclusive" dating site BeautifulPeople.com is being sold on the dark web.

New ransomware demands payment in iTunes, targets older Android software

New ransomware demands payment in iTunes, targets older Android software

A new malware type has been spotted that utilizes a couple of original moves not seen yet by researchers; it is self installing and the cybercriminals require that the ransom be paid in iTunes gift cards.

'Bored' Filipino IT experts to be hired as white-hat hackers

In order to better improve and ensure cyber-security of government websites, Philippine senator Ralph Recto plans to recruit "bored" Filipino hackers to serve as "cyber-commandos".

Smart cities still dumb enough to be hacked

Smart cities still dumb enough to be hacked

The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.

Clapper unhappy that Snowden sped up encryption by 7 years

Clapper unhappy that Snowden sped up encryption by 7 years

James Clapper, director of national intelligence has blamed the NSA whistleblower Edward Snowden for making it harder for the US to monitor and arrest terrorists by advancing the development of more advanced and widely available encryption.

Report: Ransomware feeds off poor endpoint security

Report: Ransomware feeds off poor endpoint security

Poor endpoint security practices are propelling the great ransomware epidemic of 2016 — and if allowed to fester, the threat will spread to new endpoints including IoT devices, cars and ICS and SCADA systems, a new report said.

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

The U.S. government is mulling ways it might disclose the number of Americans who have been caught up in government surveillance under the Prism program, set to expire in 2017.

Was Spotify breached? Account info shows up on Pastebin

Was Spotify breached? Account info shows up on Pastebin

Spotify may have experienced a security breach based on a list of customer account credentials discovered on Pastebin.

GozNym banking malware spotted now in Europe

GozNym banking malware spotted now in Europe

IBM's X-Force reported today the actors behind the hybrid GozNym banking trojan that stole $4 million from U.S. banks in March have released a new configuration that is targeting European banks.

One in three Americans resort to risky behaviors to remember passwords, study

One in three Americans resort to risky behaviors to remember passwords, study

A recent SecureAuth study found one in three Americans resort to risky behaviors to remember passwords.

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

The Justice Department told a federal court that it was dropping its case against the tech giant after it received a passcode for the device from an unnamed source.

Researcher finds backdoor that accessed Facebook employee passwords

Researcher finds backdoor that accessed Facebook employee passwords

A Taiwan-based security researcher, known as "Orange Tsai, who was awarded a $10,000 bug bounty in February, published a report detailing the exploits that led to his discovery of illicit code on a Facebook server.

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Rep. James Langevin wrote an open letter to the Food and Drug Administration's (FDA) praising draft guidance that would strengthen the cybersecurity of medical devices.

Government requests to Apple for customer data drop

Government requests to Apple for customer data drop

Germany, the United States and Australia were not shy when it came to asking Apple for customer information filing thousands of requests in the second half of 2015.

Hong Kong democracy activists targeted by Poison Ivy variant

Hong Kong democracy activists targeted by Poison Ivy variant

Pro-democracy activists in Hong Kong are being targeted by a new variant of Poison Ivy, a malware package that previously hadn't seen an update in six or seven years.

Hacked filipino voter records made public

Hacked filipino voter records made public

Filipino voting records which were breached earlier this month have now been made public and searchable.

SpyEye authors headed to prison

SpyEye authors headed to prison

The two men responsible for the SpyEye banking trojan, used to steal user information from financial institutions, were sentenced to a combined 24-1/2 years in prison.

Records of 93.4M Mexican voter discovered in public database

Records of 93.4M Mexican voter discovered in public database

MacKeeper Security Researcher Chris Vickery claimed to have discovered 93.4 million Mexican voter registration records.

Cyberattacks increase against manufacturing, healthcare industries

Cyberattacks increase against manufacturing, healthcare industries

Report examines the shifting direction of cyberattacks noted attackers turning their attention away from financial services, in favor of attacks against manufacturing and healthcare companies.

Most orgs couldn't quickly detect breach, study

Most orgs couldn't quickly detect breach, study

Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.

FIN6 uses legit payment card data, GRABNEW-infected systems to steal info

FIN6 uses legit payment card data, GRABNEW-infected systems to steal info

A new report from FireEye Threat Intelligence said that one case investigated by Mandiant indicated that a victim computer "was originally compromised with GRABNEW malware by a separate threat actor."

Data breach threats keep 51% of biz leaders from sleeping at night

Data breach threats keep 51% of biz leaders from sleeping at night

Over half (51 percent) of senior decision-makers in large businesses are kept awake at night due to the threat of a data breach caused by a cyber-attack.

New technique hides RATs in memory, never touching disk during its execution

New technique hides RATs in memory, never touching disk during its execution

Researchers have discovered a new trick for concealing the installation of RATs, after identifying malware samples that never touch the hard drive throughout execution, remaining in memory until the malware is fully enabled.

South Korea no 1 origin point for DDoS attacks

South Korea no 1 origin point for DDoS attacks

According to a new report by Imperva, South Korea serves as the most prolific point of origin for global DDoS attacks.

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

A coalition of industry groups representing some of the largest tech companies in Silicon Valley penned an open letter to Sen. Richard Burr (R-NC) and Sen. Dianne Feinstein (D-Calif.).

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

A federal district court judge has ruled that an Eastern Virginia magistrate overstepped her authority when granting the FBI a warrant to collect data from the user of a child pornography site, because the data resided on a computer in Massachusetts, outside her jurisdiction.

Cybercrime as a business rampant, new study

Cybercrime as a business rampant, new study

Attacks are getting fiercer and attackers more sophisticated and organized, according to the "2016 Trustwave Global Security Report," released this week.

APT spies used malware made for jealous spouses

APT spies used malware made for jealous spouses

Trend Micro has dissected malware used in the Operation C-Major attack officers of the Indian army and tracked it back to malware that originated from Pakistan.

Google's Android Security report shows some Android users left behind

Google's Android Security report shows some Android users left behind

Despite the many efforts Google undertakes to protect its customers from malicious applications, many Android users may remain vulnerable to attack because they're using outdated software.

UPDATE: Hacker taps congressman's cellphone, investigation called for

UPDATE: Hacker taps congressman's cellphone, investigation called for

The best way to encourage the U.S, government to take quick action on a cyber security issue is to anger a congressman.

Nuclear EK targeting users in10K cities worldwide, hides behind porn

Nuclear EK targeting users in10K cities worldwide, hides behind porn

Cisco Talos researchers took a deep dive in the Nuclear EK and found that it was well organized and successful.

Intelligence court affirms FBI's right to search Americans' emails without a warrant

Intelligence court affirms FBI's right to search Americans' emails without a warrant

In a declassified ruling, a federal judge of the Foreign Intelligence Surveillance Court (FISC) ruled that the FBI's search of Americans' emails without a warrant during criminal investigations is not contradictory to the Constitution or the FISA Amendments Act.

Mac researcher tries detecting ransomware generically by spotting behavior patterns

Mac researcher tries detecting ransomware generically by spotting behavior patterns

Less than two months after cybersecurity experts identified KeRanger as the first fully functioning ransomware targeting OS X, an enterprising researcher has chronicled his own attempt at creating a behavior-based ransomware detection tool for Macs.

Microsoft's data portal adds new cloud certifications

Microsoft's data portal adds new cloud certifications

Microsoft is rolling out new certifications provided through the company's data portal.

Oracle shifts to CVSS 3.0, quarterly update contains 136 fixes

Oracle shifts to CVSS 3.0, quarterly update contains 136 fixes

Oracle's quarterly Critical Patch Update was overshadowed this month by the company shifting away from using Common Vulnerability Scoring System (CVSS) version 2.0 to version 3.0.

UPDATE: Wireless mice and keyboards vulnerable to MouseJack takeover

UPDATE: Wireless mice and keyboards vulnerable to MouseJack takeover

Researchers have uncovered a vulnerability in the way non-Bluetooth dongle devices interact with wireless mice and keypads, which could enable a nearby hacker to take over a victim's computer using radio frequency signals.

SC Congress Amsterdam 2016: experts agree, info sharing essential to combatting cyber crime

SC Congress Amsterdam 2016: experts agree, info sharing essential to combatting cyber crime

A panel convened at SC Congress Amsterdam's session on preventing cyber-crime. They agreed that we need to consider the threat, our response and how we might become equally and better organised than our opponents.

SC Congress: Are you ready for the new EU data protection regulation?

SC Congress: Are you ready for the new EU data protection regulation?

When Jamie Randall, CTO of the IASME Consortium, was asked to speak at yesterday's SC Congress Amsterdam on upcoming EU data protection regulation, he says that he, like many people, "promptly fell asleep".

World's largest international cyber-defence exercise underway in Tallinn

World's largest international cyber-defence exercise underway in Tallinn

Some 26 nations and more than 550 computer experts are engaged in the worlds biggest 'live fire' international cyber-defence exercise - Locked Shields.

CCOs fear increased liability from recent compliance changes in Washington

CCOs fear increased liability from recent compliance changes in Washington

Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.

'Multigrain' variant of POS malware crops up; uses DNS tunneling to steal data

'Multigrain' variant of POS malware crops up; uses DNS tunneling to steal data

A variant of the POS malware family known as NewPosThings, called Multigrain, has introduced a twist into its repertoire—exfiltrating stolen payment card data from POS systems via the Domain Name System (DNS).

Google releases study on infected websites; more than 760K sites compromised annually

Google releases study on infected websites; more than 760K sites compromised annually

Google researchers partnered with a research team from the University of California, Berkeley to analyze the infection and potential remediation of more than 760,000 websites during an 11-month period.

Apple, FBI, square off over encryption during House subcommittee hearing

Apple, FBI, square off over encryption during House subcommittee hearing

Apple and the FBI squared off Tuesday before the Subcommittee on Oversight and Investigation of the House Committee on Energy and Commerce.

DōTERRA breach exposes customer info; including SS, DOB, and addresses

DōTERRA breach exposes customer info; including SS, DOB, and addresses

DōTERRA International notified the State of California's Attorney General's office that personal information of its customers and wholesale members, or "Wellness Advocates," was breached.

Researchers patrolling dark web uncover trojan plot targeting web hosting service

Researchers patrolling dark web uncover trojan plot targeting web hosting service

Web hosting provider Invision Power Services (IPS) was saved from a software compromise that could have potentially damaged its clients after researchers gathered intelligence on a cybercriminal operation taking place on the dark web.

Reveton actors behind new CryptXXX ransomware

Reveton actors behind new CryptXXX ransomware

Proofpoint researchers spotted a previously undocumented ransomware, dubbed CryptXXX, that has been spreading through Bedep after the Angler EK was used to infect computers and is the work of the same group behind Reveton ransomware.

Buffalo buffalo buffalo: malware that attacks malware

Buffalo buffalo buffalo: malware that attacks malware

When two malware worlds collide: Thanatos malware attacks malware, then attacks your network.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US