Audio player loading One of the worlds most famous ransomware threat actors, Conti, is breaking up - however there is very little reason to celebrate.As reported by cybersecurity researchers from Advanced Intel, the groups internal infrastructure, includi...
cybercriminals
Audio player loading Despite REvil and some of the other most notorious ransomware gangs being shut down this year, the cybercriminals behind them have continued to develop and succeed with new cross-platform capabilities, updated business processes and m...
Audio player loading The official Discord channel of the NFT marketplace OpenSea was recently infiltrated by cybercriminals who used it to distribute a phishing link.According to The Verge, a bot in the channel made a fake announcement that the NFT market...
Researchers have just identified a security flaw in a software program called Log4J, widely used by a host of private, commercial and government entities to record details ranging from usernames and passwords to credit card transactions. Since the glitch ...
Audio player loading A new variant of the BotenaGo malware that exclusively targets DVR for security camera systems has been spotted in the wild by security researchers.For those unfamiliar, BotenaGo is a relatively new malware written in Googles ope...
Audio player loading The job site and professional social network LinkedIn accounted for more than half of all brand phishing attacks during the first quarter of this year.According to Check Point Research (CPR), this is the first time that LinkedIn...
Audio player loading After falling victim to a data breach last year, the US telecom T-Mobile hired a third-party which tried to buy back the companys stolen data before it could be widely distributed online.As reported by Motherboard, the plan was u...
Photo: Visions of America/Joe Sohm/Universal Images Group (Getty Images)The National Rifle Association, defender of gun-loving maniacs everywhere, has confirmed that it did, in fact, get hacked by cybercriminals last year.AdvertisementOn Friday, the...
Cybercriminals are hijacking the devices of civil rights activists and planting "incriminating evidence" in covert cyberattacks, researchers warn.ZDNet RecommendsThe best security keyWhile robust passwords help you secure your valuable online ac...
Image: iStock/Denes FarkasHow cryptocurrency powers cybercrime Watch NowOne of the economic drivers that powers cybercrime and cybercriminal activities is cryptocurrency. We hear a lot of hype about the blockchain and about Bitcoin, Ethereum, Litecoi...
Credit: Public domain CC0.Data breaches have become commonplace, with billions of records being stolen each year around the world. Most media reports on data breaches tend to focus on how the breach occurred, the number of records stolen, and the eco...
Tech News || As email gateways become better at spotting malicious messages, operators of the sinister BazarBackdoor malware are resorting to changing up their tactics. According to reports from BleepingComputer, the TrickBot group, which created the...
Cybercriminals managed to launder at least $8.6 billion worth of cryptocurrency in 2021, according to a new report from blockchain analytics company Chainalysis.CryptoThe future of money: Where blockchain and cryptocurrency will take us nextThe best...
The International Committee of the Red Cross (ICRC) has released an update about a cyberattack that led to a data breach affecting more than 500,000 vulnerable people receiving services from the organization. ZDNet RecommendsThe best cyber insurance...
Online payment is easy and convenient. But it's not all that peachy; cybercriminals lurk around the web to compromise users. One method they employ is phishing attacks, and increasingly they've taken to using wildcard certificates to carry out t...
Fortinet has uncovered an effort to spread RedLine malware through news about the COVID-19 Omicron strain. FortiGuard Labs researchers said the people behind the malware are trying to use the ongoing pandemic to steal information and credentials. Re...
Thursday’s colonial pipeline regained operation of its entire pipeline system almost a week after a ransomware infection targeting IT systems. Pay out nearly $ 5 million Restores control of your computer network. “After this reboot, it will ta...
Credit: xijian/Getty ImagesAdvertisementResearchers have just identified a security flaw in a software program called Log4J, widely used by a host of private, commercial and government entities to record details ranging from usernames and passwords t...
Image: Shutterstock/LukmanazisOver the past decade, more and more organizations have turned to network-attached storage, making it critically important to safeguard the information stored there. Here's a look at some of the current threats to NAS and...
Image: iStockphoto/ValeryBrozhinskyWhy cybersecurity in 2018 will be an AI vs. AI slugfest Watch NowBuilding a slide deck, pitch, or presentation? Here are the big takeaways: Hackers have exploited AI technologies to take control of IoT devices, spy,...