How To Design and Build Longer Lasting Drones
Overcoming the limitations inherent in drone technology By Shaun Passley, Founder, Zenadrone Drones work. From search and rescue […] The…
China’s APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload
The state-sponsored threat actor has switched up its tactics, also adding an automated SQL-injection tool to its bag of tricks…
Winnti hackers split Cobalt Strike into 154 pieces to evade detection
The Chinese Winnti hacking group, also known as 'APT41' or 'Wicked Spider,' targeted at least 80 organizations last year and…
The Week in Ransomware – August 12th 2022 – Attacking the defenders
It was a very busy week for ransomware news and attacks, especially with the disclosure that Cisco was breached by…
Facebook finds new Android malware used by APT hackers
Meta (Facebook) has released its Q2 2022 adversarial threat report, and among the highlights is the discovery of two cyber-espionage…
No SOCKS, No Shoes, No Malware Proxy Services!
With the recent demise of several popular "proxy" services that let cybercriminals route their malicious traffic through hacked PCs, there…
Semiconductor manufacturer Semikron hit by LV ransomware attack
German power electronics manufacturer Semikron has disclosed that it was hit by a ransomware attack that partially encrypted the company's network.…
EU missile maker MBDA confirms data theft extortion, denies breach
MBDA, one of the largest missile developers and manufacturers in Europe, has responded to rumors about a cyberattack on its…
Breach Exposes Users of Microleaves Proxy Service
Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, exposed their…