[ad_1] Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks. Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including...
Read More
[ad_1] Europol has warned that a surge in demand for data on the cybercrime underground is fuelling an underground economy built on fraud, ransomware, child exploitation and extortion. Published yesterday, its 2025 Internet Organised Crime Assessment report is based on intelligence gathered from the policing group’s own investigations, the EU Serious and Organised Crime Threat...
Read More
[ad_1] New service aims to protect businesses from future quantum threats. Orange Business and Toshiba Europe have launched France’s first commercial quantum-safe network service in Paris. The Orange Quantum Defender, now living in the greater Paris region, aims to shield organisations from cyber threats posed by future quantum computing capabilities. The service combines Toshiba’s Quantum...
Read More
[ad_1] Ransomware is predicted to cost victims around $275 billion annually by 2031, according to Cybersecurity Ventures. Yet, despite this growing threat, most organizations’ data protection strategies remain narrowly focused on mission-critical systems—typically stored as block data—while neglecting one of the most vulnerable and expansive targets: Unstructured file data.  This is because it is way...
Read More
[ad_1] ( June 12, 2025, 08:29 GMT | Official Statement) — MLex Summary: Yes24, a major online bookstore in South Korea, is under investigation by the country’s privacy watchdog following a ransomware attack that potentially exposed customer data and left the platform paralyzed for at least four consecutive days. According to the Personal Information Protection Commission, it...
Read More
[ad_1] Coco Gauff’s Victory Tour Marred by Cybercrime Attack In a shocking turn of events, tennis sensation Coco Gauff fell victim to cybercrime just days after her historic French Open win. Gauff, who recently clinched her maiden French Open title, discovered that her social media account had been hacked. The 21-year-old took to Instagram to...
Read More
[ad_1] The Black Basta ransomware group, once a dominant force in the cyber extortion landscape, disbanded in February 2025 following an unexpected leak of its internal chat logs. The leak, attributed to a disgruntled member known online as “ExploitWhispers,” surfaced shortly after the group breached an unspoken norm: targeting Russian financial institutions.  ReliaQuest’s latest research...
Read More
[ad_1] As Nigeria marks Democracy Day today, the heads of missions of the United States (U.S.), United Kingdom (UK), Canada, Finland and Norway have advised the Federal Government to prevent misuse of the Cybercrimes Act, to protect free speech and economic growth. In an article by Richard Mills (Jr) of the U.S. Embassy, Richard Montgomery...
Read More
[ad_1] WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS). At its peak in May 2017, WannaCry became a global threat. Cybercriminals used the ransomware to hold organizations’ data hostage and extort money in the form of cryptocurrency. WannaCry spread using EternalBlue, an...
Read More
[ad_1] More than 1,000 malicious IP addresses in Singapore were taken down during a four-month operation led by Interpol targeting cybercriminal activities around the world, as per reports. Representational image of a hacker. Photo courtesy: Clint Patterson/Unsplash The joint operation, known as Operation Secure, took place between January and April 2025 and involved law enforcement...
Read More
1 3 4 5 6 7
National Cyber Security

FREE
VIEW