Chinese researchers accuse NSA of being behind a powerful exploit

Written by Tonya Riley Feb 23, 2022 | CYBERSCOOP A Chinese cybersecurity firm released a report Wednesday that revealed a decade-old exploit allegedly created by a covert hacking group associated…

Exploit Kits vs. Google Chrome

Avast –  Avast –  In October 2021, we discovered that the Magnitude exploit kit was testing out a Chromium exploit chain in the wild. This really piqued our interest, because…

A New Zero-day Vulnerability Is Impacting All Windows Versions

A security researcher recently revealed technical details for a zero-day privilege elevation vulnerability in Windows and also a public proof-of-concept (PoC) exploit that provides SYSTEM access under certain settings. As…

Ransomware gangs are starting more drama on cybercrime forums, upending 'honor among thieves' conventions

Written by Tonya Riley Sep 29, 2021 | CYBERSCOOP When ransomware group REvil reappeared in September after a nearly two-month downtime, its return was met with a less-than-friendly reception on the…

Holding the world to ransom: the top 5 most dangerous criminal organisations online right now

Padlokr –  Padlokr –  Roberto Musotto, Edith Cowan University; Brianna O’Shea, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University On the internet, nobody knows you’re a dog! These words…

With cyberattacks growing more frequent and disruptive, a unified approach is essential

Padlokr –  Padlokr –  Yasser Morgan, University of Regina Cyberwarfare consists of co-ordinated attacks of mass disruption (AMD). In the June summit between U.S. and Russian presidents Joe Biden and…