(Getty Images) Here’s how simple it is for script kiddies to stand up DDoS services How plug-and-play hacking tools and lax configs helped a Russian script kiddie start a scheme. 2 days ago By Christian Vasquez
(Getty Images) Malware linked to Salt Typhoon used to hack telcos around the world A report from Trend Micro details the highly sophisticated ways Salt Typhoon carries out its operations. 2 days ago By Greg Otto
Sen. Gary Peters, D-Mich., speaks during a Senate Homeland Security and Governmental Affairs Committee hearing on March 25, 2021 on Capitol Hill in Washington, D.C. (Photo by Astrid Riecken/Getty Images) Bipartisan Senate bill targets supply chain threats from foreign adversaries The bill would strengthen oversight powers for the body charged with investigating IT products from China and other foes. Nov 19, 2024 By Matt Bracken
Shakhtar Donetsk’s Ukrainian midfielder #10 Georgiy Sudakov (C) vies for the ball during the UEFA Champions League football match FC Shakhtar Donetsk vs BSC Young Boys in Gelsenkirchen, western Germany, on November 6, 2024. Hackers were recently found to be exploiting Jupyter notebooks to host illegal streams of this particular Champions League game. (Photo by INA FASSBENDER/AFP via Getty Images) Attackers are hijacking Jupyter notebooks to host illegal Champions League streams Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting soccer matches. Nov 19, 2024 By Christian Vasquez
Palo Alto Networks headquarters in Silicon Valley; Palo Alto Networks, Inc. is an American multinational cyber security company. (Getty Images) More bugs in Palo Alto Expedition see active exploitation, CISA warns Hackers have been actively targeting the firewall management software through multiple vulnerabilities. Nov 15, 2024 By Christian Vasquez
Safe Mode Securing the Skies: Aerospace Cybersecurity with David Brumley David Brumley, Cybersecurity Professor at Carnegie Mellon & CEO of Mayhem Security; Danny Jenkins, Co-Founder & CEO of ThreatLocker Nov 14, 2024 By CyberScoop Staff
Telecommunication tower during sunset. (Getty Images) Moody’s Rating adds telecoms, airlines, utilities to highest risk category The financial ratings service says industry digital reliance increases cyber risk. Nov 12, 2024 By Christian Vasquez
N. Korean hacker silhouette with North Korean Flag. (Getty Images) North Korean-linked hackers were caught experimenting with new macOS malware Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild. Nov 12, 2024 By Christian Vasquez
Members of the U.S. House of Representatives leave the U.S. Capitol after a series of votes on Sept. 25. (Photo by Anna Moneymaker/Getty Images) Host of House panels getting briefed on major Chinese hacker telecom breaches The reported scope of the Salt Typhoon hacks has expanded in recent days and weeks, from the incoming president to top U.S. officials. Nov 7, 2024 By Tim Starks
A hacker with China’s national flag in background. (Getty Images) China’s elite hackers expand target list to European Union Beijing's hackers are also using an open-source VPN tool for persistence. Nov 7, 2024 By Christian Vasquez