Los Angeles Superior Court shuts down after ransomware attack
The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations on Monday to restore systems…
The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations on Monday to restore systems…
Threat actors leverage social media to deploy malware, such as the SYS01 stealer, which steals Facebook credentials and spreads through compromised accounts. Social media’s popularity…
As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently,…
The UK’s National Crime Agency (NCA) has infiltrated and disrupted digitalstress.su, an underground criminal marketplace that hired infrastructure out to conduct distributed denial of service…
DDoS-for-hire service DigitalStress was taken down on July 2 in a joint law enforcement operation led by the United Kingdom’s National Crime Agency (NCA). The…
Researchers discovered a new ad fraud scheme named Konfety that leverages “decoy twin” apps on official marketplaces and their malicious “evil twin” counterparts. Decoy twins…
Indian Prime Minister Narendra Modi has offered a valuable tip to enhance cybersecurity for home PCs and laptops: consistently logging out of Microsoft Windows sessions.…
The Heritage Foundation this month denied that it had suffered an earlier system breach and the subsequent leaking of internal data. But the organization had…
The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and…
A Telegram for Android zero-day vulnerability dubbed ‘EvilVideo’ allowed attackers to send malicious Android APK payloads disguised as video files. A threat actor named ‘Ancryno’…
Advanced Threat Intelligence Team, Knownsec 404 has recently discovered a potential Bhutan-targeted attack by the Patchwork group that has employed an advanced Go backdoor and…
Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such domains are capable of pretending to be trusted entities, which…