IT Information Security

Ransomware Toolkit Cryptonite turning into an accidental wiper

Researchers spotted a version of the open-source ransomware toolkit Cryptonite that doesn't support decryption capabilities. Fortinet researchers discovered a sample of…

3 years ago

Crook sentenced to 18 months for stealing $20M in SIM swapping attack

Nicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more than $20 million in a…

3 years ago

French hospital cancels operations after a ransomware attack

A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend.…

3 years ago

Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. "In the Box" dark…

3 years ago

Critical Ping bug potentially allows remote hack of FreeBSD systems

A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers…

3 years ago

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity…

3 years ago

US DHS Cyber Safety Board will review Lapsus$ gang’s operations

US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies.…

3 years ago

Security Affairs newsletter Round 396

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

3 years ago

Google fixed the ninth actively exploited Chrome zeroday this year

Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google…

3 years ago

A new Linux flaw can be chained with other two bugs to gain full root privileges

Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges…

3 years ago

This website uses cookies.