How ransomware gangs are connected, sharing resources and tactics
New research by Analyst1 sheds light on the cooperation between some of the ransomware gangs dominating the cybersecurity news.
Many of us who read the news daily encounter a...
Czech Customs Seizes Ethereum in Drug Investigation
Customs officials in the Czech Republic seized cryptocurrency for the first time as part of an investigation into a suspected drug trafficking group.Seven suspected drug dealers in the Czech...
Darknet market link provider claims its Bitcoin donors’ accounts were frozen
The administrator of dark.fail, a website providing verified links to darknet markets, claims that exchanges are unfairly closing accounts donating Bitcoin to the service after implementing a Chainalysis transaction...
Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks
Mar 07, 2024NewsroomVulnerability / Web Security
Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal.
The attacks, which take the form...
Securing Enterprise Security: How to Manage the New Generation of Access Control Devices
Trend Micro Research
Given the increasing use by enterprises of contactless security solutions, the security of the devices that themselves are meant to control access to premises should be of...
Joker’s Stash, the Largest Carding Shop, is Shutting Down
Joker’s Stash, “the largest underground shop for selling stolen credit card and identity data,” will be shutting down in February 2021, according to a statement on the site.Joker’s Stash...
Security researchers play peek-a-boo with Conti ransomware server
In the game of ransomware whack-a-mole, the mole is king. Most of the time.
It’s not been a great time for ransomware authors recently. Well, some ransomware authors at...
Iranian hackers use Log4Shell to mine crypto on federal computer system
Written by AJ Vicens Nov 16, 2022 |...