The U.S. government has announced the seizure of 17 website domains used by North Korean information technology (IT) workers as part of an illicit scheme to defraud businesses across the wor… Read More
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using cyber attacks for espionage purposes. Accordin… Read More
A sophisticated backdoor framework named MATA has reared its head once more, targeting Eastern European companies in the oil and gas sector and defense industry. This cyber espionage operati… Read More
VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn MoreIn a rare public acknowledgment, Deputy Nation… Read More
Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign. Many Advanced Persistent Threat (APT) actors are from China due t… Read More
A Gaza-based threat actor has been linked to a series of cyber attacks aimed at Israeli private-sector energy, defense, and telecommunications organizations.Microsoft, which revealed details… Read More
In its latest Digital Defense Report, Microsoft has exposed the clandestine activities of a Gaza-based threat actor, code-named Storm-1133, implicated in a series of cyber-attacks targeting… Read More
In the fast-paced world of cryptocurrency, security breaches and hacks have become all too common. The third quarter of 2023, however, has sent shockwaves through the crypto community with a… Read More
Robert M. Dover, University of Hull
Russia is currently firing some 14 million shells a year in Ukraine. They are only manufacturing 2 million. The Ukrainians, on the other hand, are firi… Read More
What just happened? A ransomware group has claimed to have successfully breached the networks of Sony Group Corporation and is threatening to sell the data it stole from the Japanese tech gi… Read More
Contrary to popular opinion, Macs are far from invulnerable. In fact, every day, cybercriminals develop new tools and programs to make it easier to access the valuable data stored on Apple m… Read More