State-sponsored Iranian hackers uploaded fake VPN app to Google's Play store, posed as university officials

Written by Jeff Stone Oct 14, 2021 | CYBERSCOOP Suspected government-backed hackers from Iran have used an array of techniques, from password theft to uploading a fake app to a…

The White House is having a big meeting about fighting ransomware. It didn't invite Russia

The White House has held a meeting with ministers and officials from 30 nations and the European Union to discuss how to combat ransomware and other cyber threats.  The two-day…

Best performing cybersecurity companies and their recent developments

Cybersecurity companies are the backbone to fight cybercrime – Let’s dig deeper into which cybersecurity company is doing what and how. Cybersecurity companies play a crucial role in protecting businesses…

Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

Suspected Chinese hackers masqueraded as Indian government to send COVID-19 phishing emails

Written by Tim Starks Oct 5, 2021 | CYBERSCOOP An increasingly active Chinese government-linked hacking group impersonated Indian government agencies with phishing lures related to COVID-19 statistics and tax legislation,…

North Korea targeted cybersecurity researchers using a blend of hacking and espionage

Padlokr –  Padlokr –  North Korea has a long history of hacking targets in the U.S. Chris Price/Flickr, CC BY-ND Paulo Shakarian, Arizona State University North Korean hackers have staged…

'Almost every nation' now has cyber vulnerability exploitation program, NSA official says

Written by Tim Starks Sep 29, 2021 | CYBERSCOOP Nearly every country on the planet now has a program to exploit digital vulnerabilities, a top National Security Agency cyber official…

Malware analysis: Ragnarok ransomware

Ragnarok is recent ransomware used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 vulnerability. This article will analyze the details of this ransomware, how it works…

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Padlokr –  Padlokr –  The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers. AP Photo/Cliff Owen Scott Shackelford, Indiana University The FBI has…

Snort demo: Finding SolarWinds Sunburst indicators of compromise

Introduction to SolarWinds and Sunburst The SolarWinds hack is one of the biggest security incidents of recent years. After cyberthreat actors gained access to SolarWinds’ network, they implanted a backdoor…