Cyberattackers have turned to search engine optimization (SEO) techniques to deploy malware payloads to as many victims as possible. ZDNet …
Go malware is now common, having been adopted by both APTs and e-crime groups
The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over …
Chrome will soon try HTTPS first when you type an incomplete URL
Image: Google Google engineers have been some of the most ardent promoters of browser security features over the past few …
Berlin resident jailed for threatening to bomb NHS hospital unless Bitcoin ransom was paid
A Berlin resident has been found guilty of threatening to bomb a hospital and attempting to blackmail the UK’s National …
This chart shows the connections between cybercrime groups
Cybersecurity reports often talk about threat actors and their malware/hacking operations as self-standing events, but, in reality, the cybercrime ecosystem …
Ukraine reports cyber-attack on government document management system
Image: Oleksii Leonov (CC BY 2.0) The Ukrainian government said today that Russian hackers compromised a government file-sharing system as …
Qualcomm, Sophos ink deal to secure 5G Snapdragon PCs
Qualcomm has signed up Sophos to provide cybersecurity solutions for the next wave of 5G-enabled PCs. Announced on Tuesday, the …
Powerhouse VPN products can be abused for large-scale DDoS attacks
Botnet operators are abusing VPN servers from VPN provider Powerhouse Management as a way to bounce and amplify junk traffic …
Microsoft says SolarWinds hackers downloaded some Azure, Exchange, and Intune source code
Image: Microsoft Microsoft’s security team said today it has formally completed its investigation into its SolarWinds-related breach and found no …
Brave browser leaks onion addresses in DNS traffic
The Tor mode included with the Brave web browser allows users to access .onion dark web domains inside Brave private …