Sextortion Scams Now Include Photos of Your Home
An old but persistent email scam known as “sextortion” has a new personalized touch: The missives, which claim that malware…
List of Old NSA Training Videos
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a…
Evolving NPM Package Campaign Targets Roblox Devs, For Years
Attackers have added aggressive social engineering to their arsenal, along with a novel Windows-manipulating persistence mechanism that demands developer vigilance.…
Halliburton Data Stolen in Oil-Sector Attack
The energy Kahuna said that operations were disrupted after an attack on its supporting business applications. The energy Kahuna said…
New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems
Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct…
Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus
A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia…
Improved Software Supply Chain Resilience Equals Increased Security
Understanding through visibility, managing through governance, and anticipating through continuous deployment will better prepare organizations for the next supply chain…
BlackCat Spinoff ‘Cicada3301’ Uses Stolen Creds on the Fly, Skirts EDR
Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better. Malware…