Iran cyberterrorism image by Jorgen Schaefer
The Iranian regime has been a considerable threat to global cybersecurity ever since 2012, when it committed cyberattacks on US...
All Eye Overlord by Aswin Behera. (Source: Cyber Visuals)
The world first learned about Russian attempts to manipulate the information environment in 2013. Staff hired...
BARRY ROSENBERG writes: Visual Logic provides human-centered design consulting, better known as user experience (UX), for DoD contractors who are modernizing software applications, building...
EDMOND ROY writes: In the 1830’s Lord Thomas Babington Macaulay set about drafting a piece of legislation that would outlive not just him but also the...
Pierluigi Paganini writes: BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and REvil.
go to Security...
Pierluigi Paganini writes: Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious email.
go to Security...
Pierluigi Paganini writes: Transnet SOC Ltd, a large South African rail, port and pipeline company, announced it was hit by a disruptive cyber attack.
go to Security Affairs: South Africa’s logistics company...
Pierluigi Paganini writes: Experts found three new zero-day flaws in the Kaseya Unitrends service and warn users to avoid exposing the service to the Internet.
go to...
by Dakota Cary
CSET writes: China’s National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. As one indication of its significance, the...
Pierluigi Paganini writes: The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images.
go to Security Affairs:...
Pierluigi Paganini writes: The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost...
Tarah Wheeler and Ciaran Martin write: In recent memory, ransomware has gone from major nuisance to international crisis. Criminal gangs that target computers, encrypt their contents,...
Pierluigi Paganini writes: Researchers demonstrated how to hide malware inside an image classifier within a neural network in order to bypass the defense solutions.
go to Security...