Russia’s Priorities in Prisoner Swap Suggest Cyber Focus
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part…
Hunters International Disguises SharpRhino RAT as Legitimate Network Admin Tool
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access…
INTERPOL Recovers $41 Million in Largest Ever BEC Scam in Singapore
INTERPOL said it devised a “global stop-payment mechanism” that helped facilitate the largest-ever recovery of funds defrauded in a business…
Preparing for the Future of Post-Quantum Cryptography
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security. The AI boom and increasing popularity of quantum…
Rockwell PLC Security Bypass Threatens Manufacturing Processes
A security vulnerability in Rockwell Automation’s ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes…
Suspicious Minds: Insider Threats in The SaaS World
Everyone loves the double-agent plot twist in a spy movie, but it’s a different story when it comes to securing…
North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry
The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the JavaScript package…
A Better Investigatory Board for Cyber Incidents
When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But…