Microsoft finds Storm-0558 exploited crash dump to steal signing key
Microsoft has published details of how a Chinese state-backed advanced persistent threat (APT) actor tracked as Storm-0558 was able to get its hands on a…
Microsoft has published details of how a Chinese state-backed advanced persistent threat (APT) actor tracked as Storm-0558 was able to get its hands on a…
Microsoft says North Korean hacking groups have breached multiple Russian government and defense targets since the start of the year. As the company claims in…
In July 2023, Hackread.com reported, based on Microsoft’s findings, that Chinese hackers from the Storm-0558 ATP group had hacked European government emails. They accomplished this…
The UK government is filling out the ranks of its artificial intelligence (AI) taskforce advisory board with figures from industry, academia and national security amid…
Future Risk Predictions In a recent presentation at Black Hat 2023, HackerOne Founder, Michiel Prins, and hacker, Joseph Thacker aka @rez0, discussed some of the…
A malvertising campaign is delivering a new version of the macOS Atomic Stealer Pierluigi Paganini September 07, 2023 Researchers spotted a new malvertising campaign targeting…
Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited…
Operational technology specialist Honeywell is to incorporate quantum computing-hardened encryption keys into its smart meters for electric, gas and water meters, through a partnership with…
Google’s Threat Analysis Group (TAG) says North Korean state hackers are again targeting security researchers in attacks using at least one zero-day in an undisclosed…
Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global leader in cybersecurity solutions, has revealed its strategic move to acquire Atmosec, an innovative Software as…
For years, some cybersecurity defenders and advocates have called for a kind of Geneva Convention for cyberwar, new international laws that would create clear consequences…
Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed them to infiltrate and compromise…