Source: AI-generated using ChatGPT There are two things that live rent-free in my head. The first is my winning strategy for Oregon Trail (for starters, always play as the farmer). The second is how completely and utterly broken the ransomware ecosystem is. I’ll save Oregon Trail strategy for beers. This post is about ransomware. The...
Read More
The Commissioner of Police, Lagos State Command, Olohundare Jimoh, has reaffirmed the command’s commitment to leveraging technology in crime prevention and prosecution, particularly in tackling cybercrime and sexual and gender-based violence. Speaking in an interview with the News Agency of Nigeria on Sunday, Jimoh highlighted how technological tools were playing a pivotal role in ensuring...
Read More
Source: AI-generated using ChatGPT There are two things that live rent-free in my head. The first is my winning strategy for Oregon Trail (for starters, always play as the farmer). The second is how completely and utterly broken the ransomware ecosystem is. I’ll save Oregon Trail strategy for beers. This post is about ransomware. The...
Read More
The best-known member of Elon Musk’s so-called “department of government efficiency” (Doge) service team of technologists once provided support to a cybercrime gang that bragged about trafficking in stolen data and cyberstalking an FBI agent, according to digital records reviewed by Reuters. Edward Coristine is among the most visible members of the Doge effort that...
Read More
  What Is Ransomware as a Service? Ransomware as a Service  gets its name from the nomenclature generally used for cloud services, says Adam Meyers, CrowdStrike senior vice president of counter-adversary operations. Just as a government may contract for a Software as a Service solution, such as Zendesk for help desk communications or Slack for...
Read More
The Socio-Economic Rights and Accountability Project (SERAP) and Nigeria Guild of Editors (NGE) have urged “the government of President Bola Tinubu to immediately end the use of the draconian Cybercrimes Act to target journalists, activists, critics and other Nigerians peacefully expressing their views online, and release those in custody across the country under the legislation.”...
Read More
Politecnico di Milano’s Zanero on Evolving Malware Detection and Hardware Security Aseem Jakhar • May 4, 2025     Stefano Zanero, professor, Politecnico di Milano Machine learning excels at identifying repetitive patterns and anomalies, but human insight remains vital for understanding the broader context of cyberattacks – especially in cyber-physical ecosystems, said Stefano...
Read More
A Medusa ransomware campaign is using a malicious driver to disrupt and even delete endpoint detection and response (EDR) products on targeted organization networks. According to new research from Elastic Security Labs, the malicious driver, dubbed ABYSSWORKER, is deployed along with a packer-as-a-service called HeartCrypt to deliver Medusa ransomware. Elastic noted the driver was first...
Read More
Industry surveys suggest that, while the number of ransomware attacks continues to rise, businesses aren’t paying ransoms as often — or in as large amounts — as in the past. A February 2025 report from cyberincident response firm Coveware reported that 25% of companies hit in the last quarter of 2024 paid a ransom....
Read More
As cybercriminals develop more sophisticated tactics, investigators like Gary Rudd must stay ahead of the latest digital threats. With nearly two decades of experience as a special agent in the U.S. Department of Defense, Rudd has spent his career tracking down cybercriminals and protecting digital assets. But even with years in the field, he saw...
Read More
1 235 236 237 238 239 278
National Cyber Security

FREE
VIEW