Texas Courts Won’t Pay Up in Ransomware Attack
Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack. Continue reading Texas Courts Won’t Pay Up in Ransomware Attack
Collaborate Disseminate
Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack. Continue reading Texas Courts Won’t Pay Up in Ransomware Attack
The cyber-espionage toolkit is under active development. Continue reading Ramsay Malware Targets Air-Gapped Networks
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they’re threatening to leak the 756 gigabytes of stolen data. Continue reading REvil Ransomware Attack Hits A-List Celeb Law Firm
Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit. Continue reading Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK
Photo print service Chatbooks has disclosed a data breach after customers’ emails, passwords and more were listed for sale on underground forums. Continue reading Chatbooks Confirms Breach After ‘Shiny Hunters’ Sell Data
The infostealer has gone above and beyond in its new anti-analysis and obfuscation tactics. Continue reading Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’
If an attacker can get his hands on a Thunderbolt-equipped device for five minutes, he can launch a new data-stealing attack called “Thunderspy.” Continue reading Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack
Due to the coronavirus pandemic, there will be no in-person Black Hat USA or DEF CON conferences this year. Continue reading Black Hat USA, DEF CON 28 Go Virtual
The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum. Continue reading Hackers Breach 3.5 Million MobiFriends Dating App Credentials
Companies are looking to “shift left” with Infrastructure-as-Code (IaC) security capabilities to improve developer productivity, avoid misconfigurations and prevent policy violations. Continue reading Podcast: Shifting Cloud Security Left With Infrastructure-as-Code