Ransomware activity has skyrocketed in the ever-evolving cyber threat landscape, with Bitsight’s State of the Underground 2025 study indicating a 53% increase in ransomware group-operated leak sites and a roughly 25% increase in unique victims reported on leak sites throughout 2024. Amid this escalation, the Anubis ransomware variant has emerged as a formidable player, first...Read More
Reporting Cybercrime If you are a Pennsylvania citizen who is the victim of a cybercrime, report the crime to your local law enforcement agency. If you are a Pennsylvania citizen who is victim of a cybercrime and experienced monetary loss because of the crime, report the crime to: your local law enforcement agency, and the...Read More
When a group of states created the Multi-State Information Sharing and Analysis Center (MS-ISAC) nearly 25 years ago, the goal was to coordinate and strengthen cybersecurity, both for state agencies as well as their local governments. This was in the aftermath of 9/11, a time when much of the nation was focused on security as...Read More
Check Point Research (CPR) conducted a focused analysis of Storm-2603, a threat actor associated with recent ToolShell exploitations, together with other Chinese APT groups. Storm-2603 utilizes a custom malware Command and Control (C2) framework dubbed internally by the attacker as “ak47c2”. This framework includes at least two different types of clients: HTTP-based (dubbed by us...Read More
Mid Florida Primary Care, based in Leesburg and Summerfield, Florida, recently experienced a data breach involving unauthorized access to sensitive patient and business information. The incident began when the BianLian ransomware group claimed responsibility for infiltrating the practice’s network, posting evidence of the attack on the dark web on Dec. 14, 2024. According to the...Read More
A coalition of information-sharing groups urged their members on Wednesday to take additional steps to mitigate potential attacks by the cybercrime gang Scattered Spider, which has spent recent months attacking the insurance, retail and airline industries. “Threat actors such as Scattered Spider are constantly innovating, so organizations must be diligent in continually monitoring their processes...Read More
A remote code bug in SharePoint lets hackers hijack systems without even logging in Storm-2603 is exploiting unpatched servers using chained bugs to gain long-term access undetected ToolShell scored a perfect 10 on Bitsight’s risk scale, triggering immediate federal concern A critical flaw in on-premises Microsoft SharePoint Servers has escalated into a wider cybersecurity crisis,...Read More
With the global cost of cybercrime expected to exceed $10.5 trillion this year, according to Cybersecurity Ventures, the demand for strong and innovative security providers is rapidly increasing. The best cybersecurity firms are known for their cutting-edge threat intelligence and rapid response capabilities. As top cyber defence providers, these companies are essential in protecting critical infrastructure and...Read More
Cullman County Sheriff Matt Gentry and Cullman Police Chief Joey Duncan (Cullman Tribune file photos) CULLMAN, Ala. – Recently, the Cullman County Sheriff’s Office and Cullman Police Department each had school resource officer (SRO) training programs, as well as prepped for school safety protocols for the new year. Sheriff Matt Gentry said the Cullman County...Read More
A STUDY on “self-facilitated” livestreaming of child sexual exploitation has revealed that Filipino girls ages 13 to 15 are being lured into producing and sharing explicit content online. Some children are enticed into performing sexual acts with offers of money, gadgets or emotional attention, the study by Plan International Pilipinas found. The term “self-facilitated” is...Read More