Analysis
Akira (or Akira Ransomware) is fast becoming one of the fastest growing ransomware families, utilizing a double extortion tactic, a Ransomware-as-a-Service (RaaS) distribution model and unique payment options.
Report
Password-related cyberattacks through malware infections are at the top of the list of the most popular attacks. Nearly 31 percent of all security breaches analyzed by the Verizon DBIR team since 2013 have been related to stolen credentials.
New malware discovered
A new threat has emerged on the cybercrime scene that is specifically targeting ATMs in Europe and could therefore endanger the entire banking industry. The malware, known as “EU ATM Malware”, was recently offered for sale on a hacker forum.
10 international arrest warrants, 4 arrests
Investigators are talking about the biggest strike against cyber criminals: more than 100 servers have been confiscated and 1300 domains put out of operation in an operation in several countries worldwide.
Akamai study
Akamai Technologies, provider of web, cloud and security solutions, has presented its new “State of the Internet” report. This shows that the number of DDoS attacks is increasing most rapidly in the EMEA region (Europe, Middle East, Africa).
Ransomware group develops brute force framework
The ransomware group BlackBasta has developed a powerful tool to automate brute force attacks on edge network devices such as firewalls and VPNs. The framework, called “BRUTED”, allows attackers to crack targeted credentials and scale ransomware attacks on vulnerable networks.
Cyber espionage on a new level
The notorious advanced persistent threat (APT) group SideWinder has refined its attack tactics and significantly expanded its geographical reach. According to recent analyses by Kaspersky, the group is now specifically targeting nuclear power plants and energy facilities.
Ad
Cybersecurity Alert
Cybercriminals are becoming more sophisticated, and one of the most dangerous tactics they use against businesses is spear phishing. Unlike traditional phishing, which involves sending mass emails to random recipients, spear phishing is highly targeted.
Ad
On the Trail of a Cybercrime Titan
He is one of the most colorful figures in the hacker scene: IntelBroker repeatedly makes headlines with spectacular attacks on well-known companies. But who is this hacker? What motivates him? And what’s next for us?
Best Practices
Since the discovery of LLMJacking by the Sysdig Threat Research Team (TRT) in May 2024, this threat vector has evolved rapidly. Just as large language models (LLMs) are constantly improving and finding new applications, cybercriminals are also adapting and using new ways to gain unauthorized access to these powerful
Data Stealer SparkCat
Kaspersky experts have discovered a new Trojan hidden in apps in the AppStore and Google Play that has been active since at least March 2024.
Ad
Not responding to blackmail
Japanese electronics manufacturer Casio has published new details on the ransomware incident from October 2024. Following the conclusion of the investigation, it is now clear that the personal data of around 8,500 people was compromised.
Operation DreamJob
Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
Nearest Neighbor Attack
The Russian hacker group ATP28 has attacked a US company using a new technique called “Nearest Neighbor Attack” and gained remote access to its Wi-Fi network.
Ad

Events

Veranstaltungen

09.10.2024
 - 10.10.2024
Sarajevo
09.10.2024
 - 10.10.2024
Vienna
22.10.2024
 - 24.10.2024
Nürnberg, Germany

Most read articles.

Ad
Ad
Ad
Ad