Cyber Security Crooked Cops, Stolen Laptops & the Ghost of UGNazi Sep 30, 2024 krebsonsecurity.com A California man accused of failing to pay taxes on tens of millions of dollars allegedly earned from cybercrime also…
Technology Iranian hackers charged for ‘hack-and-leak’ plot to influence election Sep 27, 2024 bleepingcomputer.com The U.S. Department of Justice unsealed an indictment charging three Iranian hackers with a "hack-and-leak" campaign that aimed to influence…
Cyber Security U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex Sep 26, 2024 krebsonsecurity.com The United States today unveiled sanctions and indictments against the alleged proprietor of Joker's Stash, a now-defunct cybercrime store that…
Technology Automattic blocks WP Engine’s access to WordPress resources Sep 26, 2024 bleepingcomputer.com WordPress.org has banned WP Engine from accessing its resources and stopped delivering plugin updates to websites hosted on the platform,…
Technology Temu denies breach after hacker claims theft of 87 million data records Sep 17, 2024 bleepingcomputer.com Temu denies it was hacked or suffered a data breach after a threat actor claimed to be selling a stolen database…
Technology FBI tells public to ignore false claims of hacked voter data Sep 14, 2024 bleepingcomputer.com The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are alerting the public of false…
Cyber Security The Dark Nexus Between Harm Groups and ‘The Com’ Sep 13, 2024 krebsonsecurity.com A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the…
Technology Sextortion scam now use your “cheating” spouse’s name as a lure Sep 7, 2024 bleepingcomputer.com A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
Technology Sextortion scams now use your “cheating” spouse’s name as a lure Sep 7, 2024 bleepingcomputer.com A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
Cyber Security Why Legacy MFA is DOA Sep 7, 2024 cyberdefensemagazine.com Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA,…
Crooked Cops, Stolen Laptops & the Ghost of UGNazi
A California man accused of failing to pay taxes on tens of millions of dollars allegedly earned from cybercrime also…
Iranian hackers charged for ‘hack-and-leak’ plot to influence election
The U.S. Department of Justice unsealed an indictment charging three Iranian hackers with a "hack-and-leak" campaign that aimed to influence…
U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex
The United States today unveiled sanctions and indictments against the alleged proprietor of Joker's Stash, a now-defunct cybercrime store that…
Automattic blocks WP Engine’s access to WordPress resources
WordPress.org has banned WP Engine from accessing its resources and stopped delivering plugin updates to websites hosted on the platform,…
Temu denies breach after hacker claims theft of 87 million data records
Temu denies it was hacked or suffered a data breach after a threat actor claimed to be selling a stolen database…
FBI tells public to ignore false claims of hacked voter data
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are alerting the public of false…
The Dark Nexus Between Harm Groups and ‘The Com’
A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the…
Sextortion scam now use your “cheating” spouse’s name as a lure
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
Sextortion scams now use your “cheating” spouse’s name as a lure
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
Why Legacy MFA is DOA
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA,…