The Cisco Systems logo is displayed at the Mobile World Congress (MWC) in Barcelona on February 25, 2019. (GABRIEL BOUYS / AFP) Salt Typhoon gained initial access to telecoms through Cisco devices The Chinese nation-state threat group primarily gained access to Cisco devices with legitimate login credentials, according to Cisco Talos. 2 hours ago By Matt Kapko
Hacker with covered face in his operating room with multiple displays. (Sutthichai Supapornpasupad/Getty Images) Chinese-aligned hacking group targeted more than a dozen government agencies, researchers find The activity highlights a rapidly evolving, aggressive cyberespionage operation that played out across Africa, Europe, the Middle East and Asia, a Talos report says. Jun 21, 2024 By AJ Vicens
Photo of monitor while downloading a file from the “Internet to My Computer”. (spxChrome/Getty Images) Decade-old malware haunts Ukrainian police A virus dating to 2015 is still hitting targets in Ukraine, showing its enduring power. Apr 17, 2024 By AJ Vicens
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017. (Rob Engelaar / ANP / AFP) Report: New ransomware gang emerges in Vietnam Researchers discovered a new ransomware gang that appears to be in the early stages of their extortion campaigns. Aug 7, 2023 By Christian Vasquez
Illustration by Oleksandr Hurtovyi/Getty Images Hackers attempt to infiltrate Ukrainian tech company with backdoor malware, Talos says The attack could have been part of an attempt to compromise the software supply chain, the researchers said. Jul 21, 2022
(Getty Images) Information-stealing malware is spreading widely on Telegram, Cisco Talos says The ZingoStealer information stealer identified by Cisco Talos threat analysts can exfiltrate credentials and steal cryptocurrency wallet information. Apr 14, 2022 By Suzanne Smalley
An example of a decoy document used to bait Palestinian targets as part of Arid Viper hacking activity. (Cisco Talos) Researchers detect fresh wave of hacking attacks on Palestinian targets The research highlights a potent hacking group that might not be the most advanced, but doing enough to get the job done. Feb 2, 2022
(Getty) Scammers pounce on internet-for-rent services, generating cryptocurrency in quiet Email fraud and ransomware attackers apparently are not enough. Aug 31, 2021 By Jeff Stone
(Photo by John Smith/VIEWpress/Getty Images) Multiple ransomware gangs pounce on ‘PrintNightmare’ vulnerability For the second time in a week, security researchers have warned that extortionists exploited the critical flaw. Aug 13, 2021 By Sean Lyngaas
(Photo by Jack Taylor/Getty Images) Security researchers suggest naming state-harbored hackers ‘privateers’ Cybersecurity executives have compared the safe havens that some governments provide cybercriminals today with 17th century piracy. May 26, 2021 By Sean Lyngaas