6 links
tagged with all of: cybersecurity + hackers
Click any tag below to further narrow down your results
Links
The International Criminal Court (ICC) has reported a sophisticated cyberattack targeting its systems, detected and contained shortly after the intrusion occurred. This incident follows a previous attack by an espionage group two years prior, highlighting ongoing cybersecurity threats faced by the ICC.
Hackers associated with the WinOS 4.0 malware have expanded their operations into Japan and Malaysia, deploying new variants of their malicious software. This increase in activity raises concerns about the potential impact on cybersecurity in these regions, as the malware targets specific vulnerabilities to infiltrate systems.
State-sponsored hackers are increasingly exploiting vulnerabilities in critical infrastructure systems, particularly targeting sectors such as energy and transportation. These attacks are becoming more sophisticated and coordinated, posing significant risks to national security and public safety. Governments are urged to enhance their cybersecurity measures to mitigate these threats effectively.
Dell has acknowledged that hackers leaked data from a compromised demo environment, but insists the information is synthetic and does not include any sensitive data. The breach was linked to the WorldLeaks group, which claimed to have stolen 1.3 terabytes of information. Dell emphasizes that the compromised environment is separate from its main systems and contains only non-sensitive information.
A ransomware attack targeting a hospital was thwarted by ThreatLocker, which utilized application allowlisting and storage control to prevent unauthorized software from running and protect sensitive data. The cybercriminals, frustrated by the security measures, were unable to deploy their tools or execute their plan. This incident highlights how ThreatLocker effectively defends against such cyber threats.
Hackers have repurposed the Velociraptor digital forensics tool to enhance their capabilities in cyber operations, showcasing its potential for malicious use. This development raises concerns about the security and integrity of digital evidence in investigations, as tools originally designed for good can be exploited for nefarious purposes. The article discusses the implications of this trend in the context of digital forensics and cybersecurity.