Category cyber-attacks

ICE Inquires with Companies on ‘Ad Tech and Big Data’ Tools for Use in Investigations

U.S. Immigration and Customs Enforcement (ICE) has put out a call for information regarding “commercial Big Data and Ad Tech” solutions that can “directly support investigative activities.” This request, made public in the Federal Register, signals ICE’s interest in tools capable of managing and analyzing the increasing volumes of data…

Read MoreICE Inquires with Companies on ‘Ad Tech and Big Data’ Tools for Use in Investigations

Former CIA Employee Accused of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks

Major Leak Notification: Former CIA Programmer Charged in Historic Security Breach In a significant development within the realm of cybersecurity, Joshua Adam Schulte, a 29-year-old former CIA computer programmer, has been indicted in connection with what has been termed the largest leak of classified information in the agency’s history. Previously…

Read MoreFormer CIA Employee Accused of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks

Hackers Behind the 2018 Winter Olympics Attack Are Still Active and Thriving

In a recent development that recalls the infamous ‘Olympic Destroyer’ cyber attack from the 2018 Winter Olympics, the same group of hackers has emerged once again, this time targeting biological and chemical threat prevention laboratories across Europe and Ukraine, alongside several financial institutions in Russia. The malicious campaign reflects a…

Read MoreHackers Behind the 2018 Winter Olympics Attack Are Still Active and Thriving

Poland’s Energy Grid Hit by Unprecedented Wiper Malware Attack

Poland’s Electric Grid Targeted by Russian Wiper Malware: Analysis of Recent Cyberattack On January 13, researchers announced that Poland’s electric grid had been the target of a cyberattack involving wiper malware, with strong indications that the origin of this attack aligns with Russian state-sponsored hackers. This malicious software aims to…

Read MorePoland’s Energy Grid Hit by Unprecedented Wiper Malware Attack

Email Phishers Exploit Simple Methods to Circumvent MS Office 365 Security

Recent warnings from security researchers highlight a particularly insidious phishing technique known as ZeroFont, which enables cybercriminals to evade detection by AI-driven email security systems. This method utilizes hidden characters formatted with a font size of zero, allowing malicious content to blend seamlessly into legitimate communication. The ZeroFont technique involves…

Read MoreEmail Phishers Exploit Simple Methods to Circumvent MS Office 365 Security

OpenBSD Disables Intel Hyper-Threading to Mitigate Spectre-Like Vulnerabilities

OpenBSD Disables Intel Hyper-Threading amid Security Concerns In a significant move aimed at bolstering security, OpenBSD, a security-focused BSD operating system, has opted to disable support for Intel’s hyper-threading technology. This decision stems from rising concerns over potential vulnerabilities associated with Spectre-style timing attacks. Introduced in 2002, Intel’s hyper-threading technology…

Read MoreOpenBSD Disables Intel Hyper-Threading to Mitigate Spectre-Like Vulnerabilities