Krebs: At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates

Biden Administration Says Russia Arrested Colonial Pipeline Hacker

What Russia’s Arrest of REvil Hackers Means for Ransomware

Ukraine: ‘Massive Cyber Attack’ Shuts Down Government Websites

Hackers Likely Used Software Administration Rights of Third Party to Hit Ukrainian Sites, Kyiv Says

Some Signs That Cyber Attack Linked to Hacker Groups Associated With Russia

Ukraine Suspects Group Linked to Belarus Intelligence Over Cyberattack

Microsoft: Fake Ransomware Targets Ukraine in Data-Wiping Attacks

No Lights, No Heat, No Money – That’s Life in Ukraine During Cyber Warfare

U.S. Offers Support After Ukraine Hit By Massive Cyberattack

U.S. Considers Backing an Insurgency if Russia Invades Ukraine

Researchers Develop CAPTCHA Solver to Aid Dark Web Research

The Race Towards Renewable Energy Is Creating New Cybersecurity Risks

States Push Forward With Facebook Antitrust Case, Reportedly Probe VR Unit

Former DHS Official Charged With Stealing Gov’t Employees’ PII

Prosecutors Recommend Dropping Case Over China Ties Against MIT Scientist
Defense Contractor Hensoldt Confirms Lorenz Ransomware Attack

Goodwill Discloses Data Breach on Its ShopGoodwill Platform

Crawford County (AR) Grappling With Ransomware Attack Aftermath

Multi-Day IT Systems Outage Whacks Umbrella Biz Parasol Group Amid Fears of a Cyber Attack

Google Might’ve Accidentally Approved an Ad for a Target Gift Card Scam

eNom Data Center Migration Mistakenly Knocks Sites Offline

npm Dependency Is Breaking Some React Apps Today — Here’s the Fix

Watch Out, That Microsoft Edge Update Is Actually Ransomware

QLocker Ransomware Returns to Target QNAP NAS Devices Worldwide

Safari 15 Bug Can Leak Your Recent Browsing Activity and Personal Identifiers

Three Plugins With Same Bug Put 84k WordPress Sites at Risk

Critical Cisco Contact Center Bug Threatens Customer-Service Havoc

Flaw Found in IDEMIA Biometric ID Devices

New Intel Chips Won’t Play Blu-Ray Disks Due to SGX Deprecation

The Cybersecurity Measures CTOs Are Actually Implementing

Why Is Data Destruction the Best Way to Impede Data Breach Risks?

If You Use The Same Password Everywhere, This is For You

Leave a Reply