Conti's Attack Against Costa Rica Sparks a New Ransomware Era

Conti claimed responsibility for the first attack against Costa Rica’s government and is believed to have some links to the ransomware-as-a-service operation HIVE, which was responsible for the second attack impacting the country's healthcare system.

AlphaBay Is Taking Over the Dark Web—Again

In July 2017, a global law enforcement sting called Operation Bayonet took down AlphaBay’s sprawling marketplace, seizing the site’s central server in Lithuania and arresting its creator, Alexandre Cazes, outside his home in Bangkok.

Ukraine’s Digital Battle With Russia Isn’t Going as Expected

When Russian president Vladimir Putin launched his full invasion of Ukraine in February, the world expected Moscow’s cyber and information operations to pummel the country alongside airstrikes and shelling.

Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

Bridge services “wrap” cryptocurrency to convert one type of coin into another. So if you go to a bridge to use another currency, like Bitcoin (BTC), the bridge will spit out wrapped bitcoins (WBTC).

The Workaday Life of the World’s Most Dangerous Ransomware Gang

On February 28, a newly created Twitter account called @ContiLeaks released more than 60,000 chat messages sent among members of the gang, its source code, and scores of internal Conti documents.

Critical Security Flaws Impact Hundreds of Thousands of Medical Devices, ATMs, and Manufacturing Equipment

New findings about seven vulnerabilities in an Internet of Things remote management tool underscore the interconnected exposures in medical devices and the broader IoT ecosystem.

Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory

At around 9 pm local time on February 26, Ukraine’s deputy prime minister and minister for digital transformation, Mykhailo Fedorov, announced the creation of the volunteer cyber army.

Inside the Lab Where Intel Tries to Hack Its Own Chips

Five years ago, Intel launched a dedicated hardware hacking group known as Intel Security Threat Analysis and Reverse Engineering (iSTARE) to analyze and attack Intel's future generations of chips.
February 2, 2022

Inside Trickbot, Russia’s Notorious Ransomware Gang

The gang has grown its original banking trojan to become an all-purpose hacking toolkit; individual modules, which operate like plugins, allow its operators to deploy Ryuk and Conti ransomware.

Safari Vulnerability Exposed Webcams, Online Accounts, and More

MacOS has built-in protections to prevent this sort of attack, including Gatekeeper. But this hack got around those safeguards by abusing iCloud and Safari features that macOS already trusts.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags