(Photo by Cesc Maymo/Getty Images) Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands The action against illicit versions of legitimate Cobalt Strike applications represents the culmination of a year-long investigation. Apr 6, 2023 By Elias Groll AJ Vicens
A server room run by the internet connection and data center company Equinix in Amsterdam on July 14, 2021. (Photo by SEM VAN DER WAL / ANP / AFP via Getty Images) Google Cloud offers good news and bad news on Log4Shell, other issues Potential intruders are still scanning for the bug every day, but the company says many vendors have been on top of fixing vulnerable instances of Log4j software. Feb 15, 2022
Two phone boxes in London. (Photo by John Keeble/Getty Images) Criminals are using call centers to spread ransomware in a crafty scheme You might want to think twice about canceling that subscription. Jul 29, 2021 By Tonya Riley
A semiconductor silicon wafer being tested. (Getty Images) Suspected Chinese hackers target telecoms, research in Taiwan, Recorded Future says Hackers also targeted academia, research and development, and government organizations in Nepal, the Philippines and Taiwan. Jul 8, 2021 By Tonya Riley
A shuttered Coop supermarket store is pictured in Stockholm, Sweden on July 3, 2021, during an ongoing “colossal” cyber-attack affecting organizations around the world. (Photo by ALI LORESTANI/TT NEWS AGENCY/AFP via Getty Images) Malware spammers aim to leverage Kaseya ransomware drama in email campaign Big attacks can have long tails. Jul 7, 2021 By Tim Starks
The FIN7 hacking group stole more than 15 million payment cards from businesses throughout the U.S., according to the FBI (Flickr/Vilson Frangaj). Cybercriminals are deploying legit security tools far more than before, researchers conclude Hackers are also turning to trusted services like Dropbox and Google Drive to host and distribute malware. Jun 29, 2021 By Tonya Riley