Feds warn about foreign government-connected hackers aiming to disrupt vital industrial systems

Written by Tim Starks Apr 13, 2022 | CYBERSCOOP A joint federal advisory Wednesday says that foreign government-linked hackers are targeting specific industrial processes with tools meant to breach and…

Bigger demands, bigger payouts are the trend in ransomware, report says

Written by Joe Warminsky Mar 24, 2022 | CYBERSCOOP Large and highly organized cybercrime groups like Conti are helping to drive up the overall cost of ransomware attacks, according to…

Russia-linked Gamaredon shows signs of possible recent activity in Ukraine, researchers say

Written by AJ Vicens Feb 4, 2022 | CYBERSCOOP A series of cyberattacks on Ukrainian institutions over the past few weeks — including website defacement, computer-wiping malware and phishing campaigns…

Unpacking the rise of BlackCat ransomware: High victim count, high payouts, customized features

Written by AJ Vicens Jan 27, 2022 | CYBERSCOOP Despite being a relative newcomer, the BlackCat ransomware family is moving up the list of the most prolific operators in the…

Interpol arrests 11 alleged members of Nigerian scam syndicate 'SilverTerrier'

Written by AJ Vicens Jan 19, 2022 | CYBERSCOOP International law enforcement authorities say they’ve arrested nearly a dozen members of a notorious Nigerian cybercrime gang potentially responsible for targeting…

Threat Group Takes Aim Again at Cloud Platform Provider Zoho

Attackers that previously targeted the cloud platform provider have shifted their focus to additional products in the company’s portfolio. State-backed adversaries expanded attacks against cloud platform company Zoho and its…

The In-house Zoho ServiceDesk Exploit Used to Drop Webshells

You may recall that we reported a while ago that state-backed advanced persistent threat (APT) organizations had been actively exploiting a significant hole in a Zoho single sign-on and password…

These researchers wanted to test cloud security. They were shocked by what they found

Insecure cloud-computing services can be a huge risk for organisations because they’re a regular target for cyber criminals. Researchers have demonstrated how vulnerable or misconfigured cloud services can be, after deploying hundreds…

Google: Half of compromised cloud instances have weak or no passwords

Online criminals are deploying cryptocurrency miners within just 22 seconds of compromising misconfigured cloud instances running on Google Cloud Platform (GCP). Cryptocurrency mining is by far the main malicious activity…

Malicious Actors Were Able to Compromise Exposed Services in 24 Hours

Harmful actors are continually scouring the Internet for vulnerable services that may be used to gain access to internal networks or carry out other malicious acts. Researchers sometimes develop publicly…