Attacks Erase Western Digital Network-Attached Storage Drives
The company suspects a remote code execution vulnerability affecting My Book Live and My Book Live Duo devices and recommends that business and individual users turn off the drives...
Researchers Share Common Tactics of ShinyHunters Threat Group
New information from Intel 471 examines the common exploit tactics of the cybercrime group known as ShinyHunters.
ShinyHunters is behind several high-profile breaches over the last two years. Its attacks...
New Atom Silo Ransomware Group Targets Confluence Servers
Security researchers are tracking a new ransomware group called Atom Silo, which uses a newly disclosed vulnerability in Atlassian's Confluence collaboration software (CVE-2021-26084) as well as new tactics that...
Feds Seize Domains Dealing Stolen Personal Data
The Justice Department and FBI today announced that three separate Internet domains have been seized for offering access to stolen data and performing network attacks.
The domains include WeLeakInfo.to, ipress.in,...
Water Utility Hack Could Inspire More Intruders
If past cyberattacks are any indication, success begets imitation. In the wake of last week's hack of Florida water utility, other water utilities and users of remote desktop software...
Data from 553 Million Facebook Accounts Leaked Online
Personal information belonging to more than 533 million Facebook users was found available on a cybercrime forum.The personal details of more than 533 million Facebook account holders from 106...
Ukraine’s ‘IT Army’ Stops 1,300 Cyberattacks in 8 Months of War
Ukrainian President Volodymyr Zelensky spoke to the G20 Summit's "Digital Transformation" panel this week, offering the benefits of his embattled country's cyber-defense experience to G20-allied countries. Zelensky noted that...
Many Mobile Apps Intentionally Using Insecure Connections for Sending Data
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.Many mobile...
Global BEC Crackdown Nets 65 Suspects
The FBI teamed up with international law enforcement agencies from around the globe to apprehend 65 alleged business email compromise (BEC) scammers behind crimes that cost some 500 US victims...
Microsoft: 58% of Nation-State Cyberattacks Come From Russia
Russia is the source of the lion's share of nation-state cyberattacks Microsoft has observed in the past year (58%), followed by North Korea (23%), Iran (11%), China (8%), and South...