
Cybersecurity
Boris Johnson’s mobile phone was analysed by cybercrime investigators after Downing Street was targeted by hacking software, it has been reported. The Pegasus spyware, which can effectively turn mobile phones into listening devices, is said to have been found on multiple…
Top U.S. officials are ramping up their warnings about possible Russian cyberattacks on critical infrastructure as the war in Ukraine escalates. In an interview with “60 Minutes” on CBS, Deputy Attorney General Lisa Monaco and Cybersecurity and Infrastructure Security…
CISA, the FBI, and the US Treasury Department warned today that the North Korean Lazarus hacking group is targeting organizations in the cryptocurrency and blockchain industries with trojanized cryptocurrency applications. The attackers use social engineering…
U.S Cyber Command has outlined just over $236 million in priorities that weren’t included in the command’s fiscal year 2023 spending request. The unfunded requirements list is one of several the various military services and the Defense Department’s combatant commands…
An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software development cycle from August 2020, with the malware authors prioritizing features to improve the efficiency of its workflows…
Cisco's enterprise-facing Webex video conferencing and messaging utility monitors the microphone at all times, even when the user's microphone is muted in the software, according to warning from a group of academic researchers. According to researchers from the…
Kaspersky today revealed it found a vulnerability in Yanluowang ransomware's encryption algorithm, which makes it possible to recover files it encrypts. The Russian cybersecurity firm has added support for decrypting files locked by the Yanluowang ransomware strain to its…
Cybersecurity researchers have disclosed a new version of the SolarMarker malware that packs in new improvements with the goal of updating its defense evasion abilities and staying under the radar. "The recent version demonstrated an evolution from Windows Portable…
MetaMask has published a warning for their iOS users about the seeds of cryptocurrency wallets being stored in Apple's iCloud if app data backup is active. MetaMask is a “hot” cryptocurrency wallet used by over 21 million investors to store their wallet tokens and…
The decentralized, credit-based finance system Beanstalk disclosed on Sunday that it suffered a security breach that resulted in financial losses of $182 million, the attacker stealing $80 million in crypto assets. As a result of this attack, trust in Beanstalk’s…