Photo of monitor while downloading a file from the “Internet to My Computer”. (spxChrome/Getty Images) Decade-old malware haunts Ukrainian police A virus dating to 2015 is still hitting targets in Ukraine, showing its enduring power. 3 days ago By AJ Vicens
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017. (Rob Engelaar / ANP / AFP) Report: New ransomware gang emerges in Vietnam Researchers discovered a new ransomware gang that appears to be in the early stages of their extortion campaigns. Aug 7, 2023 By Christian Vasquez
Illustration by Oleksandr Hurtovyi/Getty Images Hackers attempt to infiltrate Ukrainian tech company with backdoor malware, Talos says The attack could have been part of an attempt to compromise the software supply chain, the researchers said. Jul 21, 2022
(Getty Images) Information-stealing malware is spreading widely on Telegram, Cisco Talos says The ZingoStealer information stealer identified by Cisco Talos threat analysts can exfiltrate credentials and steal cryptocurrency wallet information. Apr 14, 2022 By Suzanne Smalley
An example of a decoy document used to bait Palestinian targets as part of Arid Viper hacking activity. (Cisco Talos) Researchers detect fresh wave of hacking attacks on Palestinian targets The research highlights a potent hacking group that might not be the most advanced, but doing enough to get the job done. Feb 2, 2022
(Getty) Scammers pounce on internet-for-rent services, generating cryptocurrency in quiet Email fraud and ransomware attackers apparently are not enough. Aug 31, 2021 By Jeff Stone
(Photo by John Smith/VIEWpress/Getty Images) Multiple ransomware gangs pounce on ‘PrintNightmare’ vulnerability For the second time in a week, security researchers have warned that extortionists exploited the critical flaw. Aug 13, 2021 By Sean Lyngaas
(Photo by Jack Taylor/Getty Images) Security researchers suggest naming state-harbored hackers ‘privateers’ Cybersecurity executives have compared the safe havens that some governments provide cybercriminals today with 17th century piracy. May 26, 2021 By Sean Lyngaas
India’s defense ministry is pictured during a welcome ceremony for Brunei’s armed forces commander in August 2019. (Photo by PRAKASH SINGH/AFP via Getty Images) Suspected Pakistani spies use catfishing, stealthy hacking tools to target Indian defense sector Transparent Tribe’s improved capabilities are a case study in how governments not known for their hacking prowess can evolve. May 13, 2021 By Sean Lyngaas
The streets of Najaf, a city in south-central Iraq, are pictured in March 2020. A new hacking campaign is dubbed “Fajan,” or Najaf spelled backwards, after a malicious computer script used in the activity. (Photo by HAIDAR HAMDANI/AFP via Getty Images) Hackers pose as Bloomberg employees in email scam The emails politely ask users in fluent English to enable Microsoft Excel features that allow the code to execute. Apr 21, 2021 By Sean Lyngaas