The cost of cybercrime - in one graphic

The cost of cybercrime – in one graphic

Visualizing the massive cost of cybercrime What do Equifax, Yahoo, and the U.S. military have in common? They’ve all fallen victim to a cyberattack at…

View More The cost of cybercrime – in one graphic
North Korean malware found on Indian nuclear plant's network

North Korean malware found on Indian nuclear plant’s network

The network of one of India’s nuclear power plants was infected with malware created by North Korea’s state-sponsored hackers, the Nuclear Power Corporation of India…

View More North Korean malware found on Indian nuclear plant’s network
Tor Weaponized to Steal Bitcoin

Tor Weaponized to Steal Bitcoin

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser. Criminals are using the Tor browser — long…

View More Tor Weaponized to Steal Bitcoin
China supported C919 airliner development through cyber espionage

China supported C919 airliner development through cyber espionage

Security researchers have correlated the activity of a Chinese hacker group known for targeting aerospace companies to a multi-year espionage effort by China’s intelligence agencies…

View More China supported C919 airliner development through cyber espionage
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Nation-state spy agencies are only as good as their operational security—the care they take to keep their digital spy operations from being discovered. But occasionally…

View More Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC
German Police Storm Bulletproof Data Center In Former NATO Bunker

German Police Storm Bulletproof Data Center In Former NATO Bunker

German law enforcement raided a former NATO bunker suspected of being the location of a hosting service used for illegal activities. On Friday, investigators said…

View More German Police Storm Bulletproof Data Center In Former NATO Bunker
Russian state hackers rarely share code with one another

Russian state hackers rarely share code with one another

Russia’s state-sponsored hacking groups rarely share code with one another, and when they do, it’s usually within groups managed by the same intelligence service, a…

View More Russian state hackers rarely share code with one another
Remote Hack Forces Gas Pump To Give Away $1800 Of Free Gas

Remote Hack Forces Gas Pump To Give Away $1800 Of Free Gas

One of the pumps at a Detroit area gas station was attacked by hackers recently. The compromised pump gave away more than 600 gallons of…

View More Remote Hack Forces Gas Pump To Give Away $1800 Of Free Gas
King iPhone Hacker NSO Group Robbed By Employee -- Spyware On Dark Web Sale For $50 Million, Israel Claims

King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims

As well as becoming something of a bête noire of privacy and human rights activists, Israel’s NSO Group has established itself as one of the…

View More King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims
Cyberattackers now pose as business executives to secure security certificates

Cyberattackers now pose as business executives to secure security certificates

Security certificates are intended to elicit trust in users for the deployment of software, but as with so many other safeguards, threat actors can find…

View More Cyberattackers now pose as business executives to secure security certificates