Category cyber-attacks

North Korean Cyber Criminals Set Sights on Cryptocurrencies and POS Systems

In a new wave of cybercrime, the Lazarus Group, a North Korean state-sponsored hacking organization, has ramped up its activities, focusing on the cryptocurrency sector. Recent reports by security firm Proofpoint indicate a large-scale malware campaign targeting digital currency users, further illustrating the group’s extensive involvement in financially motivated cyberattacks.…

Read MoreNorth Korean Cyber Criminals Set Sights on Cryptocurrencies and POS Systems

CBP Enters Agreement with Clearview AI for Face Recognition in ‘Tactical Targeting’

U.S. Customs and Border Protection Expands Use of Facial Recognition Technology Amid Security Concerns U.S. Customs and Border Protection (CBP) has finalized a contract worth $225,000 for a year-long subscription to Clearview AI, a controversial facial recognition service that matches images against vast databases derived from publicly available online content.…

Read MoreCBP Enters Agreement with Clearview AI for Face Recognition in ‘Tactical Targeting’

Hackers Targeting Database Servers to Mine Cryptocurrency

Chinese Cybercrime Group Targets Database Servers Globally Recent investigations by security firm GuardiCore Labs have uncovered a series of extensive cyber-attack campaigns spearheaded by a prominent Chinese criminal organization. These attacks, which utilize multiple innovative techniques, are primarily aimed at database servers for the illicit purposes of mining cryptocurrencies, extracting…

Read MoreHackers Targeting Database Servers to Mine Cryptocurrency

Satori IoT Botnet Takes Advantage of Zero-Day Vulnerability to Compromise Huawei Routers

The recent resurgence of IoT malware variants, specifically those derived from the infamous Mirai botnet, presents a significant cybersecurity threat. Although the original creators of Mirai have been apprehended, its code remains publicly accessible, enabling cybercriminals to exploit its vulnerabilities. Hackers have leveraged this botnet to covertly build networks of…

Read MoreSatori IoT Botnet Takes Advantage of Zero-Day Vulnerability to Compromise Huawei Routers

Two Romanians Indicted for Hacking Police CCTV Cameras Ahead of Trump Inauguration

Cybersecurity Incident: Hacking of Washington D.C. Police Surveillance Cameras In a significant cybersecurity breach, a pair of Romanian nationals successfully compromised approximately 70% of the computers controlling the Washington D.C. Metropolitan Police Department’s surveillance camera network earlier this year. This incident unfolded just days before the inauguration of President Donald…

Read MoreTwo Romanians Indicted for Hacking Police CCTV Cameras Ahead of Trump Inauguration

Pride Month Phishing Scams Target Employees Using Trusted Email Services

Although Pride Month does not officially start until June 1, 2026, cybersecurity experts have already noted a rise in phishing attacks targeting employees with Pride-themed emails, indicating that scammers are capitalizing on upcoming events well ahead of time. Organizations are currently facing a phishing campaign leveraging Pride Month and diversity…

Read MorePride Month Phishing Scams Target Employees Using Trusted Email Services

[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks

In a significant development for cybersecurity, two critical vulnerabilities in processor architecture—dubbed Meltdown and Spectre—have come to light, prompting urgent responses from technology vendors aimed at mitigating the associated risks. These vulnerabilities affect a vast range of modern processors and pose threats to virtually all operating systems, including Windows, Linux,…

Read More[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks

Original Secure Boot Certificates for Windows Expire in June—Here’s What You Should Do

Assessing Secure Boot Certificates for Enhanced Cybersecurity As organizations continue to navigate the complexities of cybersecurity, the integrity of their systems takes center stage. An essential component in ensuring that integrity is the management of Secure Boot certificates. These certificates, embedded within a computer’s firmware, authenticate the operating system at…

Read MoreOriginal Secure Boot Certificates for Windows Expire in June—Here’s What You Should Do

New Mirai Okiru Botnet Sets Its Sights on Devices with Common ARC Processors

The landscape of cybersecurity threats has reached unprecedented dimensions and is projected to escalate significantly in 2018. The original architects of the notorious Mirai DDoS botnet have been apprehended, yet variants of this infamous IoT malware continue to proliferate, largely due to the public availability of its source code on…

Read MoreNew Mirai Okiru Botnet Sets Its Sights on Devices with Common ARC Processors