Cybercrime | News, how-tos, features, reviews, and videos
A post-mortem of a recent ransomware attack illustrates the continued importance of basic security controls such as patching in withstanding an evolving cybercrime threat.
Most observers attribute the attack, which leveraged VPN and Microsoft 365 security holes, to state actors working for China.
IntelBroker shared snippets of data from the breach of Lulu Hypermarket, threatening a full database leak at a future date.
Ransomware attack saw LockBit group access and download critical customer information.
A design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions.
The group — also known as Kryptonite Panda, Gingham Typhoon, Leviathan, and Bronze Mohawk — is believed to be working for China’s Ministry of State Security.
A hacker infiltrated OpenAI’s internal messaging system, gaining access to employee discussions regarding the company’s latest AI advancements, according to a New York Times report.
The Indirector attack discovered by University of California San Diego researchers focuses on the indirect branch predictor of a CPU.
Users were sent phishing emails linking to a website revealed to be a crypto drainer.
A logic bomb is malicious code that waits for the right time or opportunity to strike. Some infamous examples show the potential for damage.