Ukraine Arrests Cryptor Specialist Aiding Conti and LockBit Ransomware

Ukrainian Police have arrested a ransomware cryptor developer in connection with the notorious Conti and LockBit groups. This arrest was the result of Operation Endgame, a major operation that aims to dismantle key elements of these cybercriminal organ… Continue reading Ukraine Arrests Cryptor Specialist Aiding Conti and LockBit Ransomware

How Many Western ICs Are There In Russia’s Weapons?

A screenshot of the website, showing various parts from Western manufacturers

Recently, the Ukrainian government has published a database of Western components being used in recently produced Russian armaments, and it’s a fascinating scroll. Just how much does Russia rely on …read more Continue reading How Many Western ICs Are There In Russia’s Weapons?

FCC vote on tap for rules to secure fundamental component of the internet

The regulations would seek to bolster Border Gateway Protocol security, but some industry groups are concerned the proposal is too heavy-handed.

The post FCC vote on tap for rules to secure fundamental component of the internet appeared first on CyberScoop.

Continue reading FCC vote on tap for rules to secure fundamental component of the internet

Russian influence op keeps trying but struggles to win hearts and minds

Meta researchers said the influence operation known as Doppelganger continues to target European elections and Ukraine policy with little impact.

The post Russian influence op keeps trying but struggles to win hearts and minds appeared first on CyberScoop.

Continue reading Russian influence op keeps trying but struggles to win hearts and minds

Feds Bust N. Korean Identity Theft Ring Targeting US Firms

By Deeba Ahmed
North Korea targeted US companies with stolen identities in a cybercrime scheme. The Justice Department cracks down, seizes websites, and disrupts revenue streams.
This is a post from HackRead.com Read the original post: Feds Bust N. Kor… Continue reading Feds Bust N. Korean Identity Theft Ring Targeting US Firms

Departing top CISA official reflects on nearly four years in the cyber hot seat

Eric Goldstein spoke with CyberScoop about where the Cybersecurity and Infrastructure Security Agency has made progress, lessons learned and what’s next.

The post Departing top CISA official reflects on nearly four years in the cyber hot seat appeared first on CyberScoop.

Continue reading Departing top CISA official reflects on nearly four years in the cyber hot seat

Latvian TV Channels Hacked to Broadcast Russian Victory Day Parade

By Deeba Ahmed
Confused Latvians woke up to the Russian Victory Day parade on their TVs! Hackers targeted a content delivery network to manipulate broadcasts exposing media supply chain vulnerabilities.
This is a post from HackRead.com Read the origina… Continue reading Latvian TV Channels Hacked to Broadcast Russian Victory Day Parade

Hacker posts fake news story about Ukrainians trying to kill Slovak President

Czech news agency ČTK announced on Tuesday that a hacker had managed to break into its systems and published fake news reports of a plot to murder the president of a neighbouring country.

Read more in my article on the Hot for Security blog. Continue reading Hacker posts fake news story about Ukrainians trying to kill Slovak President

Mandiant: Notorious Russian hacking unit linked to breach of Texas water facility

Researchers from the Google-owned firm conclude that Sandworm personas are linked to several recent attacks on critical infrastructure. 

The post Mandiant: Notorious Russian hacking unit linked to breach of Texas water facility appeared first on CyberScoop.

Continue reading Mandiant: Notorious Russian hacking unit linked to breach of Texas water facility