Hacking

Korean cybersecurity agency released a free decryptor for Hive ransomwareKorean cybersecurity agency released a free decryptor for Hive ransomware

Korean cybersecurity agency released a free decryptor for Hive ransomware

Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions.…

3 years ago
Experts blame North Korea-linked Lazarus APT for the Harmony hackExperts blame North Korea-linked Lazarus APT for the Harmony hack

Experts blame North Korea-linked Lazarus APT for the Harmony hack

North Korea-linked Lazarus APT group is suspected to be behind the recent hack of the Harmony Horizon Bridge. Recently, threat…

3 years ago
YTStealer info-stealing malware targets YouTube content creatorsYTStealer info-stealing malware targets YouTube content creators

YTStealer info-stealing malware targets YouTube content creators

Researchers detailed a new information-stealing malware, dubbed YTStealer, that targets YouTube content creators. Intezer cybersecurity researchers have detailed a new…

3 years ago
Path Traversal flaw in UnRAR utility can allow hacking Zimbra Mail serversPath Traversal flaw in UnRAR utility can allow hacking Zimbra Mail servers

Path Traversal flaw in UnRAR utility can allow hacking Zimbra Mail servers

Researchers discovered a new flaw in RARlab's UnRAR utility, tracked CVE-2022-30333, that can allow to remotely hack Zimbra Webmail servers.…

3 years ago
RansomHouse gang claims to have stolen 450GB of data from chip maker giant AMDRansomHouse gang claims to have stolen 450GB of data from chip maker giant AMD

RansomHouse gang claims to have stolen 450GB of data from chip maker giant AMD

The RansomHouse gang claims to have breached the Chipmaker giant AMD and stole 450 GB of data from the company…

3 years ago
NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURENON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s…

3 years ago
ZuoRAT malware hijacks SOHO Routers to spy in the vitimsZuoRAT malware hijacks SOHO Routers to spy in the vitims

ZuoRAT malware hijacks SOHO Routers to spy in the vitims

A new RAT dubbed ZuoRAT was employed in a campaign aimed at small office/home office (SOHO) routers in North American…

3 years ago
LockBit 3.0 introduces important novelties, including a bug bounty programLockBit 3.0 introduces important novelties, including a bug bounty program

LockBit 3.0 introduces important novelties, including a bug bounty program

The LockBit ransomware operators released LockBit 3.0 with important novelties, including a bug bounty program and Zcash payments. The Lockbit…

3 years ago
The government of Lithuania confirmed it had been hit by an intense cyberattackThe government of Lithuania confirmed it had been hit by an intense cyberattack

The government of Lithuania confirmed it had been hit by an intense cyberattack

Lithuania confirmed it had been hit by an "intense" cyberattack, after Vilnius imposed restrictions on the rail transit of certain…

3 years ago
Cyberattack halted the production at the Iranian state-owned Khuzestan Steel companyCyberattack halted the production at the Iranian state-owned Khuzestan Steel company

Cyberattack halted the production at the Iranian state-owned Khuzestan Steel company

Iranian state-owned Khuzestan Steel Company was hit by a cyber attack that forced the company to halt its production. The Khuzestan Steel…

3 years ago