[ad_1] WARNING: This story contains distressing content. A 15-year-old Aboriginal boy, subject to a child protection order, died by suicide in a Queensland residential care home last weekend.  If you or anyone you know needs help: Suicide Call Back Service on 1300 659 467 Lifeline on 13 11 14 Aboriginal & Torres Strait Islander crisis...
Read More
[ad_1] The Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in their ransomware-as-a-service (RaaS) models and double-extortion strategies. Both groups leverage stolen credentials, VPN vulnerabilities, reconnaissance, privilege escalation, defense evasion, and data exfiltration to infiltrate systems, primarily targeting small and medium-sized businesses (SMBs) with recycled...
Read More
[ad_1] A new report from cybersecurity firm Forescout reveals a critical shift in the cyber threat landscape: attackers are increasingly targeting non-traditional devices to gain a foothold in enterprise networks.   The company’s H1 2025 Threat Review found a significant increase in ransomware and zero-day exploits aimed at “overlooked and unconventional network corners” such as...
Read More
[ad_1] Students in Naperville and across the country are getting ready to go back to school, making this the perfect time to remind students, parents and the community about the Naperville Police Department’s August Safer Naper topic: Back-to-School Safety. General Back to School Tips No matter what a student’s age, be sure to discuss important...
Read More
[ad_1] Navy pushing for AI to bolster authentication in a zero trust environment AI agents can create behavioral profiles that can more accurately authenticate not just a person or a device, but authenticate a person to a specific device. Daisy Thornton@dthorntonWFED August 6, 2025 4:55 pm 3 min read It’s perhaps no surprise that two...
Read More
[ad_1] Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines. The abused driver is ‘rwdrv.sys’ (used by ThrottleStop), which the threat actors register as a service to gain kernel-level access. This driver is likely used to load a second...
Read More
[ad_1] Cybercrime , Fraud Management & Cybercrime , Ransomware Researchers See ‘Acceleration’ in Existing Threats, Ongoing Criminal Success Mathew J. Schwartz (euroinfosec) • August 6, 2025     Image: Cursor/Shutterstock Cybercrime so far this year can be summarized as featuring “more of everything,” with researchers tracking increases in the number of ransomware and data breach...
Read More
[ad_1] Manassas Park City Schools notified the community recently it was the victim of a data breach that could have exposed personal information. The school division became aware of the data incident on June 13, at which time an investigation began. “To date, our investigation revealed that malicious actors gained access to MPCS’s network on...
Read More
[ad_1] Researchers at Infoblox have released new findings on VexTrio, a large criminal enterprise that uses a set of traffic distribution systems (TDSs), lookalike domains and registered domain generation algorithms (RDGAs) to deliver malware, scams and illegal content. The researchers have been able to link nine individuals, shell companies and a sprawling infrastructure to the...
Read More
[ad_1] DaVita reveals more on effects of April 2025 ransomware attack The Interlock group stole sensitive files on thousands of people Affected patients offered free identity theft monitoring US healthcare company DaVit has revealed it suffered a ransomware attack and a data breach earlier this year which saw patient data stolen. The company, which specializes...
Read More
1 2 3 7
National Cyber Security

FREE
VIEW