Advertisement

Uncategorized

Russian soldiers stand on Red Square in central Moscow on September 29, 2022, as the square is sealed prior to a ceremony of the incorporation of the new territories into Russia. (Photo by ALEXANDER NEMENOV/AFP via Getty Images)

Russia-aligned threat groups dupe Ukrainian targets via Signal

Google researchers say multiple Russian state threat groups have conducted remote phishing operations to target and compromise Signal accounts.
Cars drive past the headquarters of the Russian General Staff’s Main Intelligence Department (GRU) in Moscow on December 30, 2016. (Photo by NATALIA KOLESNIKOVA/AFP via Getty Images)

Russian state threat group shifts focus to US, UK targets

A subgroup of Seashell Blizzard exploited public vulnerabilities in internet-facing systems, Microsoft researchers said.
On Dec. 27, VulnCheck detailed the vulnerability, tracked as CVE-2024-12856, wherein an attacker can leverage default credentials in Four-Faith F3x24 and F3x36 routers to remotely inject commands into the operating system. (Getty Images)

Thousands of industrial routers vulnerable to command injection flaw 

The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai.
Advertisement
The Department of Justice seal is seen on a lectern ahead of a press conference announcing efforts against computer hacking and extortion at the Department of Justice in Washington, DC on November 28, 2018. (Photo by MANDEL NGAN/AFP via Getty Images)

Justice Department unveils charges against alleged LockBit developer

The U.S. Department of Justice revealed charges Friday against Rostislav Panev, a dual Russian and Israeli national, for his alleged role as a developer in the notorious…
Advertisement
Advertisement