WANA (Mar 26) – The hacker group Handala has issued a new warning, giving Lockheed Martin employees 48 hours to cease cooperation with Israel and immediately leave the country. In their latest statement, Handala declared that they have launched a new phase of operations against Lockheed Martin. The group claims full access to sensitive...Read More
Earlier this month, South Korean prosecutors indicted nine men accused of working for a romance scam ring based in Myanmar. These individuals were involved in voice phishing — a tactic used to manipulate victims into revealing sensitive information, such as passwords and banking accounts — and scammed vulnerable Korean citizens of sums between 70 million...Read More
Blessing Ibunge in Port Harcourt The United Nations Office on Drugs and Crime (UNODC), in partnership with the Nigeria Police Force National Cybercrime Center (NPF-NCCC), has enhanced the capacity of police officers in the fight against crimes, with a focus on cybercrime. The NPF-NCCC was established to operationalise the Cybercrimes (Prohibition, Prevention, etc.) Act 2015...Read More
Endpoint security used to revolve around the assumption that work only happens on corporate devices within corporate networks. This assumption meant that security architectures were built to protect endpoints. IT teams focused on sending locked-down, company-owned laptops and protecting network boundaries, since at the time, they were the entire security perimeter. That model used to...Read More
WESTMINSTER, CA — A 19-year-old man was arrested after he grabbed an 8-year-old boy playing with a friend in Orange County, police announced Tuesday. Anthony Enrique Gonzalez was booked on suspicion of kidnapping, kidnapping with the intent to commit a sexual act, lewd or lascivious act with a minor, lewd or lascivious act with a...Read More
Following reports by hacktivist group APT Iran that it had hacked the company, defence and aerospace giant Lockheed Martin has said it is aware of the threat actor’s claims. “We are aware of the reports and have policies and procedures in place to mitigate cyber threats to our business,” a Lockheed Martin spokesperson told Cyber...Read More
A tentatively confirmed list in progress Remember the days when you’d wake up to a horrifying story about a famous man you liked or respected being credibly accused of or admitting to coffee-curdling awfulness? But just one. Singular. Those were the days. Oh, to worry over whether or how to engage with the work of,...Read More
What changes when quantum computers arrive? Sushmita Ruj, Faculty of Engineering Lead at the UNSW Institute for Cybersecurity, IFCYBER and Associate Professor at the School of Computer Science and Engineering (CSE), UNSW, Sydney, says that not all quantum machines pose a threat to current encryption methods. “Cryptographically relevant quantum computers have the power to break currently...Read More
Linux has long been considered a more secure operating system than Windows, but that reputation is being tested. A ransomware group known as Pay2Key, attributed to Iranian threat actors, has developed a Linux variant that is actively targeting organizational servers, virtualization hosts, and cloud workloads. The malware was first detected in the wild in late...Read More
The overall maturity, level of organization, and specialization within the ransomware economy means we are dealing with an adversary whose tactics, techniques, and procedures (TTPs) are approaching the sophistication of some nation-state-sponsored attackers. In many cases, there has been documented overlap between nation-state attack elements and those of cybercriminal ransomware gangs. Today’s ransomware attacks are more...Read More