Category cyber-attacks

StoneDrill Disk Wiping Malware Discovered Targeting European Industries

A newly identified disk-wiping malware known as StoneDrill has emerged, targeting a petroleum company in Europe. This malware bears similarities to the infamous Shamoon, which notoriously deleted data from 35,000 computers at Saudi Arabia’s national oil company back in 2012. Disk-wiping malware like StoneDrill can inflict severe damage on organizations…

Read MoreStoneDrill Disk Wiping Malware Discovered Targeting European Industries

Proposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

The debate surrounding the legality and morality of counter-hacking actions, known colloquially as “hacking back,” has resurfaced as a significant concern among cybersecurity professionals and lawmakers. As cybersecurity incidents continue to escalate, victims are often left questioning whether they can retaliate against their attackers. While hacking back is considered illegal…

Read MoreProposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

Hundreds of Prominent Twitter Accounts Compromised via Third-Party App

A significant Twitter breach has occurred, affecting a myriad of accounts belonging to various high-profile entities, including media organizations, celebrities, and institutions like the European Parliament, Forbes, and UNICEF. The attack unfolded early Wednesday morning and involved the dissemination of a troubling spam message in Turkish, equating the Dutch with…

Read MoreHundreds of Prominent Twitter Accounts Compromised via Third-Party App

US Government iPhone-Hacking Toolkit May Be in the Possession of Foreign Spies and Criminals

Recent findings by Google reveal that vulnerabilities exploited by the Coruna toolkit have been patched by Apple in the current versions of its iOS operating system, specifically iOS 26. As a result, the techniques used by Coruna are only confirmed to affect devices running iOS versions 13 through 17.2.1. This…

Read MoreUS Government iPhone-Hacking Toolkit May Be in the Possession of Foreign Spies and Criminals

Email Scam Broadly Targets GitHub Developers Using Dimnie Trojan

Open source developers utilizing GitHub have been alerted to a phishing email campaign aimed at infecting their systems with a sophisticated malware trojan known as Dimnie. This malicious software is designed to perform reconnaissance and espionage, enabling attackers to steal login credentials, download confidential files, capture screenshots, log keystrokes on…

Read MoreEmail Scam Broadly Targets GitHub Developers Using Dimnie Trojan

LLMs Can Reveal the Identities of Pseudonymous Users at Scale with Remarkable Precision

Researchers Highlight Risks of LLM-Based Deanonymization Techniques Recent studies have illuminated the growing ability of large language models (LLMs) to deanonymize users online, posing significant privacy concerns for various stakeholders. In an experiment involving the Netflix dataset, researchers evaluated the efficacy of LLMs against traditional deanonymization methods. They began with…

Read MoreLLMs Can Reveal the Identities of Pseudonymous Users at Scale with Remarkable Precision

WikiLeaks Unveils ‘Marble’ Source Code Exploited by CIA to Implicate Russia and China

WikiLeaks Exposes CIA’s Marble Framework to Obscure Malware Origins In a groundbreaking revelation, WikiLeaks has unveiled hundreds of classified documents from its Vault 7 series, detailing the CIA’s capabilities for concealing its cyber operations. Among the newly released files is a component called “Marble,” which allegedly enables the agency to…

Read MoreWikiLeaks Unveils ‘Marble’ Source Code Exploited by CIA to Implicate Russia and China