CISA sent out an advisory on Wednesday centered around the Conti ransomware, providing detailed information for the cybersecurity community about the ransomware group and its affiliates.
LG signed a deal with the startup to acquire 63.9% of its shares. LG will also acquire additional shares of Cybellum by the year’s end, with the amount to be finalized then.
In H1 2021, Google holds the top slot with over 547 vulnerabilities, Microsoft was second with 432 unwanted exposure instances and Oracle is on number three with 316 vulnerabilities.
Malware specialists have found evidence of how REvil ransomware’s leadership may have hijacked chats with victims of their own affiliates to cut them out of their ransomware payouts.
A survey found that 77% of respondents have already abandoned or stopped creating an online account due to demands for too much personal information (40%) and too many security steps (29%).
Hackers are upping their game, using an approach some experts call “Deep Sea Phishing,” which is the use of a combination of sophisticated techniques to become more aggressive.
iTerm2 is a favorite of security researchers because of the propensity for malware to take control or detect usage of the Terminal app, which can interfere with attempts to reverse engineer malware.
Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other critical industries.
The FBI had penetrated the REvil gang’s servers to obtain the key, but after discussing it with other agencies, the bureau decided to wait before sending it to victims to avoid tipping off the gang.
Microsoft uncovered a massive operation that provides phishing services to cybercrime gangs using a hosting-like infrastructure that the OS maker likened to a Phishing-as-a-Service (PHaaS) model.