
Comment: Ransomware analysis
The ransomware landscape remains dynamic and fast-moving.
This is demonstrated by the significant increase in ransomware attacks and their impact in the second quarter (April-June) of 2024.
The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.
Digital self-defense
Major events in 2024 bring joy to sports fans, but also cyber risks. The summer of sport was therefore not just a festival for fans, but also a playground for digital threats.
Security breach or hysteria?
An alleged hack at data broker National Public Data (NPD) made headlines this week for potentially exposing billions of social security numbers. Real leak or hysteria?
Industrial Control Systems (ICS)
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
In the midst of the election campaign, hackers have targeted both the Republicans and the Democrats. Is this an attempt to influence the U.S. presidential election?
The latest analysis from Cato CTRL reveals alarming developments in the cybersecurity landscape. The threat actor “IntelBroker” emerges as a central figure in selling stolen data and source code, and also plays a prominent role in hacking forums.
Iran suspected
A few months before the US election, reporters are allegedly leaked internal communications from the Trump team.
Are foreign hackers interfering in the election campaign?
Tragedy following Ransomware Attack
A Swiss farmer has become the target of a hacker attack that not only paralyzed his computer systems but also had fatal consequences for one of his animals.
Mindful
The Italian sports car manufacturer Ferrari recently suffered a sensitive deepfake attack. A high-ranking manager became the target of a fraud attempt in which criminals used AI technology to impersonate the company boss.