Indiana National Guard Suffers Ransomware Attack

Indiana National Guard Suffers Ransomware Attack

The Indiana National Guard confirmed that a ransomware attack affected some of its members’ personally identifiable information. On 18 October, the Indiana National Guard said in a statement that ransomware had infected ...
If At First You Do Not Succeed... Try, Try Again: Russian VPNFilter Malware

If At First You Do Not Succeed… Try, Try Again: Russian VPNFilter Malware

Sean Gallagher, writing at Ars Technica, regales us with the tale of VPNFilter - The Multi-Tool of Russian Miscreants. Today's Must Read! ...
TRITON Attribution: Russian Government-Owned Lab Most Likely Built
Custom Intrusion Tools for TRITON Attackers

TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers

Overview In a previous blog post we detailed the TRITON intrusion that impacted industrial control systems (ICS) at a critical infrastructure facility. We now track this activity set as TEMP.Veles. In this ...
Drupal Patches Critical Remote Code Execution Flaws

Drupal Patches Critical Remote Code Execution Flaws

The popular Drupal content management system received fixes for five serious vulnerabilities that allow for remote code execution and could help hackers break into websites. Two of the patched vulnerabilities are rated critical ...
Security Boulevard
Kraken Cryptor v2.0.7 Ransomware – How to Remove It

Kraken Cryptor v2.0.7 Ransomware – How to Remove It

This article has been created to help explain what is Kraken Cryptor v2.0.7 ransomware and how you can remove this virus from your computer and try to restore encrypted files. A new ...
Inside the industry of cybercrime | Avast

Inside the industry of cybercrime | Avast

| | cybercrime, Malware
For as long as there’s been an internet, there’s been cybercrime. Real-world criminal activity is mirrored in our digital lives. In both worlds, you find stalking, theft, extortion, destruction of property, and ...
Know Your Firewall: Layer 3 vs. Layer 7

New Attacks Reuse Malware Code from Dormant APT1

New attacks against organizations from South Korea, Canada and the United States use a malicious implant that’s based on an old malware program associated with a dormant Chinese APT group known as ...
Security Boulevard
BlackEnergy Successor Hits Energy Companies Since 2015

BlackEnergy Successor Hits Energy Companies Since 2015

For the past three years, a stealthy cyberespionage group has been targeting energy companies, primarily from Poland and Ukraine, using a new malware framework dubbed GreyEnergy. GreyEnergy is a modular malware platform ...
Security Boulevard
RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin

RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin

A US court has sentenced a programmer to 30 months in a federal prison in connection with software that claimed to be a legitimate tool for Windows sysadmins to remotely manage computers, ...
Loading...