IDF reservists walk through an area near the Gaza border on November 13, 2023 in Southern Israel. (Alexi J. Rosenfeld/Getty Images) Pro-Palestinian hacking group evolves tactics amid war A long-running espionage campaign shows signs of iteration and development amid Gaza fighting, researchers say. Nov 14, 2023 By AJ Vicens
(Boris Zhitkov/Getty Images) Cybercriminals have adapted since Microsoft’s decision to block macros Microsoft's decision to disable macros by default last year has forced hacking crews to find new, and sometimes old, ways to get a foothold. May 12, 2023 By AJ Vicens
Researchers say that a North Korean hacking group known for cryptocurrency heists is widening its aim (Getty Images) North Korean cryptocurrency hackers expand target list North Korean hackers known for cryptocurrency heists are expanding their targets to include education, government and healthcare, according to researchers tracking the group. The activity could be… Jan 25, 2023 By Tonya Riley
Researchers at the cybersecurity firm Proofpoint attributed a cyberattack on a “close affiliate” of former National Security Adviser John Bolton, seen here in Washington in August 2022, to an Iranian hacking group known as TA453. (Photo by Anna Moneymaker/Getty Images) Iranian hacking group expands focus to US politicians, critical infrastructure, researchers find The group known as TA453 has added "outlier" attacks to its portfolio over the past two years, seemingly in concert with Iranian hardliners. Dec 14, 2022 By AJ Vicens
Getty Images Phishing scheme targeting Mideast researchers uses ‘herd mentality’ approach to dupe victims The tactic linked to an Iranian group creates the impression the email activity is real by employing a phenomenon known as "social proof." Sep 13, 2022
Getty Images Health care IT workers report increased cyberattacks affecting patient care More than half of the respondents to a health care cybersecurity survey say their organizations suffered a ransomware attack in the past year. Sep 8, 2022
Proofpoint’s Phil Fuster on the intersection between cloud ID management and zero trust Proofpoint's Phil Fuster catches up with CyberScoop at Gov Identity Summit 2022. Jul 12, 2022 By CyberScoop Staff
An aerial view of Blagoveshchensk, located on Amur river, opposited to Chinese city of Heihe (seen at background), May 22, 2014. (Photo by Sasha Mordovets/Getty Images) Research points to a Chinese hacking effort targeting a Russian border unit The findings add detail to other suspected Chinese hacking campaigns in Europe related to the Russian invasion of Ukraine. Apr 27, 2022
Ukrainian serviceman as seen on the checkpoint in the Independence Square on March 30, 2022 in Kyiv, Ukraine. (Photo by Anastasia Vlasova/Getty Images) Russian, Chinese, Belarusian hackers increasingly using Ukraine-themed lures in attacks, Google observes The Threat Analysis Group report sheds light on international efforts to leverage the war in hacking campaigns. Mar 30, 2022
People stand with their luggage as they wait to be relocated from the temporary shelter for refugees in a former shopping center between the Ukrainian border and the Polish city of Przemysl, in Poland, on March 8, 2022. (Photo by LOUISA GOULIAMAKI/AFP via Getty Images) Against backdrop of Russian-Ukraine war, researchers witness flurry of nation-aligned hacking Polish, Ukrainian and European targets are facing a barrage of cyber operations, researchers say. Mar 8, 2022