Cyber Crime

ESXi ransomware attacks use SSH tunnels to avoid detectionESXi ransomware attacks use SSH tunnels to avoid detection

ESXi ransomware attacks use SSH tunnels to avoid detection

Threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Researchers at cybersecurity firm Sygnia…

4 months ago
U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, Silk Road creatorU.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, Silk Road creator

U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, Silk Road creator

Donald Trump pardoned Ross Ulbricht, creator of the notorious dark web, drug marketplace Silk Road , after 11 years in…

5 months ago
Two ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizationsTwo ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizations

Two ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizations

Two ransomware groups exploiting Microsoft 365 services and default settings to target internal enterprise users. Sophos researchers started investigating two…

5 months ago
Cloudflare blocked a record-breaking 5.6 Tbps DDoS attackCloudflare blocked a record-breaking 5.6 Tbps DDoS attack

Cloudflare blocked a record-breaking 5.6 Tbps DDoS attack

Cloudflare announced that it has blocked a record-breaking 5.6 terabit-per-second (Tbps) distributed denial-of-service (DDoS) attack. Cloudflare announced that during the…

5 months ago
New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routersNew Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called…

5 months ago
HPE is investigating IntelBroker’s claims of the company hackHPE is investigating IntelBroker’s claims of the company hack

HPE is investigating IntelBroker’s claims of the company hack

HPE is probing claims by the threat actor IntelBroker who is offering to sell alleged stolen source code and data…

5 months ago
Malicious npm and PyPI target Solana Private keys to steal funds from victims’ walletsMalicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have…

5 months ago
Prominent US law firm Wolf Haldenstein disclosed a data breachProminent US law firm Wolf Haldenstein disclosed a data breach

Prominent US law firm Wolf Haldenstein disclosed a data breach

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The…

5 months ago
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breachesClop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches.…

5 months ago
MikroTik botnet relies on DNS misconfiguration to spread malwareMikroTik botnet relies on DNS misconfiguration to spread malware

MikroTik botnet relies on DNS misconfiguration to spread malware

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a…

5 months ago