North Korean Lazarus Group is targeting crypto funds with a new spin on an...
Microsoft reports that a threat actor has been identified targeting cryptocurrency investment startups. A party Microsoft has dubbed DEV-0139 posed as a cryptocurrency investment company on Telegram and used...
Ankr deploys $15M to make users whole as Helio stablecoin recovers after exploit
According to a Twitter post dated Dec. 7, stablecoin protocol Helio, which issues the HAY stablecoin pegged against the U.S. dollar, said that the firm had bought back $3...
Russia Readies Winter Cyberattacks As Troops Retreat From Ukraine
With a beleaguered and retreating Russian military, analysts warn that winter's chill will be accompanied by a new barrage of cyberattacks against Ukraine's infrastructure, supply chains, partners, and political...
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a hidden source of open-source risk flies under the radar...
Machine Learning Models: A Dangerous New Attack Vector
Threat actors can hijack machine learning (ML) models that power artificial intelligence (AI) to deploy malware and move laterally across enterprise networks, researchers have found. These models, which often are publicly...
Russian Actors Use Compromised Healthcare Networks Against Ukrainian Orgs
Russia-affiliated threat actors have compromised systems belonging to multiple organizations in the US, the UK, France, and other countries and are using them to launch attacks against targets in Ukraine.Among...
Intellicene Brand Launches After Completion of Acquisition by Volaris Group
MELVILLE, NY, Dec. 6, 2022 — Intellicene, a provider of intelligent software platforms that empower organizations to better understand and respond to mission-critical events, today announced the close of...
Hive Social Buzzing With Security Flaws, Analysts Warn
Social media users looking for an alternative to Elon Musk's Twitter should probably avoid Hive Social, according to a team of cybersecurity experts who turned their attention to the...
Wiper, Disguised as Fake Ransomware, Targets Russian Orgs
Companies infected with purported ransomware may no longer have an option to pay a ransom.A new malicious program acts exactly like crypto-ransomware — overwriting and renaming files, then dropping...
Malware Authors Inadvertently Take Down Own Botnet
It's not often that malware authors go through the effort of creating a malicious tool for assembling a botnet, only to then find a way to effectively sabotage it...