News & Press
Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive ransomware.
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
One of the most notorious ransomware groups that has wreaked havoc across the world has gone dark for now.
Earlier today, the FBI seized the Hive ransomware gang’s dark web website as part of a “coordinated law enforcement action” alongside the Secret Service and other European enforcement agencies.
The US Department of Justice says that a joint US and European operation has taken down the notorious Hive ransomware gang.
Researchers on Thursday reported on multiple campaigns they have stopped in which threat actors used HR policy announcements and benefits updates to start off 2023 to lure victims and steal employees credentials.
The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense.
Criminal gangs are using a new method to guarantee a ransomware payout: They're ditching the part where they lock up a target firm's systems by encrypting them and are skipping straight to holding the company's precious data for ransom.
A lot of the SaaS apps are from small, growing companies, which means they often have poor security. That’s why the Intruder researchers say security teams need to deploy password managers, enable two-factor authentication, and offer security training to the rank-and-file staff.
Artificial intelligence and machine learning (AI/ML) models have already shown some promise in increasing the sophistication of phishing lures, creating synthetic profiles, and creating rudimentary malware, but even more innovative applications of cyberattacks will likely come in the near future.
A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats.
Researchers on Thursday showed just how fast today’s threat actors are moving to the cloud by reporting that Automated Libra, the South African threat group behind the freejacking campaign PurpleUrchin, created more than 130,000 user accounts on various platforms, including Heroku, Togglebox, and GitHub to conduct crytpomining operations.
The AI-enabled chatbot that's been wowing the tech community can also be manipulated to help cybercriminals perfect their attack strategies
Any multifactor authentication adds protection, but a physical token is the best bet when it really counts.
The FBI, Food and Drug Administration, and Department of Agriculture have warned that U.S. food suppliers had hundreds of thousands of dollars in shipments stolen in business email compromise attacks, according to CNN.
Cybercriminals have in recent months stolen hundreds of thousands of dollars’ worth of shipments from US food suppliers by placing fraudulent orders for milk products, the FBI and other federal agencies warned on Friday.
A Lilac Wolverine business email compromise (BEC) gang is launching widespread campaigns requesting gift cards. To begin, the threat actor compromises a personal email account and copies its contact list. The attackers then created a new email account with the same email address as the compromised account, but with a different provider (usually Gmail, Hotmail, or Outlook).
Cybercrime operation Lilac Wolverine has launched a massive gift card business email compromise attack, which lures targets into giving gift cards to individuals posing as seriously ill people or having lost relatives to illnesses, ZDNET reports.
A cybercrime group based in Nigeria is targeting businesses in the United States and Western Europe with a plethora of scam emails as part of a larger campaign of business email compromise (BEC) attacks.
Despite economic headwinds, cybersecurity startups still did well in terms of raising funds in 2022. CRN breaks down what you should know about some of the security standouts.
The new Security Posture Management product from Abnormal gives security teams immediate visibility to each of the potential entry and exit points to the cloud email platform.
A cruel business email compromise (BEC) gang is hacking people's email accounts and sending messages to their contacts claiming the account owner needs to send a gift to an unwell friend in an attempt to manipulate people into sending online gift cards.
Abnormal Security has released Security Posture Management, its newest addition to the product portfolio as the company progresses toward delivering the cloud email security.
Abnormal Security announced today its newest addition to the product portfolio as the company progresses toward delivering the most comprehensive cloud email security in the market. The latest innovation protects customers from emerging email platform attacks that are increasing in volume and severity as attackers find new ways to target organizations.