Wazawaka Goes Waka Waka
In January, KrebsOnSecurity examined clues left behind by "Wazawaka," the hacker handle chosen by a major ransomware criminal in the…
In January, KrebsOnSecurity examined clues left behind by "Wazawaka," the hacker handle chosen by a major ransomware criminal in the…
Variants of the Mirai codebase are still a popular way to compromise and subvert Internet of Things devices, but experts…
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.
Volume of traffic associated with the malware is now back at 50% of the volume before law enforcement took the…
Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity…
There's some unusual activity brewing on Russian-speaking cybercrime forums, where hackers appear to be reaching out to Chinese counterparts for…
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
A thirty-month international law enforcement operation codenamed 'Operation Cyclone' targeted the Clop ransomware gang, leading to the previously reported arrests…
Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.
A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing…