Danny Palmer is a senior reporter at ZDNet. Based in London, he writes about issues including cybersecurity, hacking and malware threats.
A warning from international cybersecurity agencies has urged IT service providers and their customers to take action to protect themselves from the threat of supply chain attacks.
Hackers hit web hosting provider linked to Oregon elections - OPB
A week before Oregon's primary election , the secretary of state's office is moving to protect the integrity of its online system where campaign finance records are published after a web hosting provider was hit by a ransomware attack.
Secretary of State Shemia Fagan's office said people inputting records into the ORESTAR state campaign finance reporting system may have been affected, and have been sent detailed instructions on how to proceed.
Hackers are using SEO to rank malicious PDFs on search engines, research finds | VentureBeat
The increase in phishing attacks and the growing popularity of SEO techniques among cybercriminals highlights the need for enterprises to provide their employees with security awareness training so they're prepared to spot threats and not at risk of handing over sensitive information.
Russian hackers targeting opponents of Ukraine invasion, warns GCHQ chief | Hacking | The Guardian
Russian operatives trying to escalate online conflict and seeking targets in countries opposing war, says Jeremy Fleming
As well as affecting Ukraine directly, there had been "some spillover of activity affecting other countries", Fleming said, and evidence that Russian actors were trying to escalate the conflict further afield.
Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia
An espionage-focused threat actor known for targeting China, Pakistan, and Saudi Arabia has expanded to set its sights on Bangladeshi government organizations as part of an ongoing campaign that commenced in August 2021.
Cybersecurity firm Cisco Talos attributed the activity with moderate confidence to a hacking group dubbed the Bitter APT based on overlaps in the command-and-control (C2) infrastructure with that of prior campaigns mounted by the same actor.
Hackers Are Now Exploiting Windows Event Logs | eSecurityPlanet
Hackers have found a way to infect Windows Event Logs with fileless malware , security researchers have found.
Kaspersky researchers on May 4 revealed "a new stash for fileless malware." During a "very targeted" campaign, hackers used Windows Event Logs to inject shellcode payloads and operate stealthily.
Pro-Russian hackers target Italy institutional websites -ANSA news agency | Reuters
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
ROME, May 11 (Reuters) - Pro-Russian hackers have attacked the websites of several Italian institutions, including the senate, ANSA news agency reported on Wednesday.
Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit | TechRepublic
A number of vulnerabilities within the printing application has led to a string of cyberattacks from all over the world.
"Windows Print Spooler vulnerabilities are a hotbed for emerging new threats," said Alexey Kulaev, security researcher at Kaspersky.
The attacks have targeted users from a number of countries around the world, as the cybersecurity company found that from July 2021 to April 2022, nearly a quarter of detected hits came from Italy.
Russian hackers 'ramping up efforts' after cyberattack shut down Ukraine internet ...
Russia carried out a cyberattack during the beginning of its invasion of Ukraine , cutting off from the internet thousands of modems throughout Europe, officials from the U.S., Great Britain, Canada, Estonia and the European Union announced Tuesday.
Russian hackers attacked Viasat's KA-SAT network in late February as Russian forces marched into Ukraine, the Western governments reported.
Hackers Actively Exploit F5 BIG-IP Bug | Threatpost
Threat actors have started exploiting a critical bug in the application service provider F5’s BIG-IP modules after a working exploit of the vulnerability was publicly made available.
The critical vulnerability, tracked as CVE-2020-1388 , allows unauthenticated attackers to launch “arbitrary system commands, create or delete files, or disable services” on its BIG-IP systems.
Hackers are using tech services companies as a 'launchpad' for attacks on customers Joint alert by @NCSC @CISAgov… https://t.co/1WEh44ohvM dannyjpalmer (from London, England) Wed May 11 12:11:59 +0000 2022
System Unknown NFT Collection
#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART
https://opensea.io/collection/systemunknown
Check out the System Unknown artwork. Click here.
No comments:
Post a Comment