Network SecurityCorrupted Microsoft Office documents used in phishing campaignThe corrupted files evade security systems but are easily recovered to deliver phishing links.
RansomwareCyberVolk analysis explores ransomware, hacktivism interconnectionsSeveral intertwined pro-Russia groups use their political stance to justify extorting governments.
Network SecurityNorth Korean IT worker scam linked to Chinese front companiesSentinelLabs reveals information on four previously unreported Chinese front companies taken down by the U.S. government Oct. 10.
RansomwareRussian women stepping up for cybercrime outfitsWomen are increasingly taking on top roles within Russian-speaking threat actor groups.
Data SecurityFBI and CISA warn of continued cyberattacks on US telecomsChina’s campaign against U.S. telecoms has been ongoing for years.
Cybersecurity daily newsRed red team team: Threat actors hire pentesters to test out ransomware effectivenessThreat actors are hiring freelance pentesters to improve the effectiveness of their ransomware attacks
AI/MLLeveraging AI securely: Microsoft’s approach to AI data protectionTo move beyond the challenges of "Shadow AI," organizations are looking to AI-powered productivity tools and solutions.
RansomwareUpstart SafePay ransomware group uses LockBit builder, claims 22 victimsHuntress researchers describe two SafePay ransomware incidents resulting in file encryption and exfiltration.
MalwareNorth Korea’s Lazarus observed testing new macOS trojan in the wildGroup-IB says the "RustyAttr" trojan could potentially be used in future attacks once the attackers make it more robust.
What security pros can learn from the bad information spread during this year’s election cycleJim RichbergOctober 8, 2024
Seven tips that offer short-term and long-term fixes following the CrowdStrike outageCallie Guenther July 19, 2024