Newly uncovered evidence suggests that the recent cyberattack targeting US medical technology giant Stryker involved compromised credentials obtained via infostealer malware. The attack on Stryker, a major manufacturer of surgical equipment and orthopedic implants for hospitals worldwide, came to light on March 11, with the Iran-linked hacker group Handala immediately taking credit. Handala, which is...Read More
The Council for the European Union on Tuesday announced sanctions against three companies and two individuals for their alleged roles in hacking activities targeting EU member states. The sanctions target two Chinese companies, namely Integrity Technology Group and Anxun Information Technology, which are believed to provide products and services supporting hacking activities globally, as well...Read More
iPhones are always considered more secure than Android devices. Recently, NATO approved iPhones and iPads to handle classified information, which speaks volumes about the iPhone’s security. However, as reported by Wired, researchers from Google, iVerify, and Lookout have uncovered a sophisticated iPhone hacking technique called DarkSword. It is as alarming as it sounds. The tool...Read More
World Backup Day is drawing renewed attention to the growing risk of ransomware and a shifting view of backup: no longer a back-office chore, but a board-level concern, according to senior leaders at CTERA. They describe a move away from traditional disaster-recovery thinking towards models that assume active, intelligent attacks on both production systems and...Read More
MADISONVILLE, Ky. (WFIE) – $2.5 million is coming to Madisonville thanks to some federal funding announced by Senator Mitch McConnell. The money will be used for equipment at a new cybercrime training facility being developed there. Officials say the facility will be the largest police training academy in the Commonwealth and will focus specifically on...Read More
China is the world’s leading promoter of cybercrime, according to all reports. But there is a small Asian country that is steadily gaining importance in this industry: North Korea. The hermetic state, strangled by trade embargoes, has found its main source of foreign currency in online criminal activity. Analysts agree that the structure of the...Read More
Security researchers have discovered another sophisticated iOS exploit kit and found evidence that it has been used by both state-sponsored hackers and commercial spyware vendors. A Russian state-sponsored espionage group tracked as UNC6353 has been using the iOS exploit kit in attacks against Ukraine. In early March, Google and iVerify shared details on Coruna, a...Read More
Technology has become quite intrusive in our lives. As our tech reaches new levels of sophistication, concerns inevitably arise regarding our privacy and security. The age-old question over the need to balance liberty with security has become a major topic of discussion. One cyber expert has unveiled a new phone that ensures privacy is of...Read More
Google and cybersecurity companies Lookout and iVerify have detailed a new hacking technique that potentially puts a significant portion of iPhone users in danger, just by visiting the wrong web page. The hack is called “DarkSword” and it currently targets iOS 18 releases between iOS 18.4 and iOS 18.6.2. For its part, an Apple spokesperson...Read More
Florida has long been recognized as a national leader in hurricane preparedness and disaster response. Today, the state is harnessing that same spirit of innovation and readiness to address a different, and increasingly dangerous, threat: cyberattacks. Experts warn that cyberattacks are no longer a question of if, but when they will occur. This means that...Read More