Car dealership office. (Fahroni, iStock/Getty Images Plus) CDK hack shows SEC disclosure standards are unsettled The early application of the regulatory agency’s new cybersecurity reporting rules reveal that materiality is in the eye of the beholder. Jul 16, 2024 By Tim Starks
Houthi movement supporters brandish rifles, flags of Yemen and Palestine, Houthi emblems, and chant slogans as they participate in a demonstration in solidarity with the Palestinian people on June 28, 2024, in Sana’a, Yemen. (Photo by Mohammed Hamoud/Getty Images) Researchers catch Yemeni hackers spying on Middle East military phones The firm Lookout says that Houthi use of cyberespionage is a sign that mobile surveillance is a growing force in global conflicts. Jul 9, 2024 By Tim Starks
David Wall/Getty Images Sanctioned and exposed, Predator spyware maker group has gone awfully quiet Sanctions, newspaper investigations and reports exposing the Intellexa alliance’s infrastructure all might have led to its diminished state. Jul 1, 2024 By Tim Starks
Members of the People’s Liberation Army flag honour guard march in Tiananmen Square after the closing session of the NPC, or National People’s Congress at the Great Hall of the People on March 11, 2024 in Beijing, China. (Photo by Kevin Frayer/Getty Images) Chinese hackers are increasingly deploying ransomware, researchers say Elite state-backed hackers are embracing the use of ransomware to obfuscate their operations. Jun 26, 2024 By AJ Vicens
An Iranian flag waves in a wind outside the Vienna International Centre hosting the United Nations (UN) headquarters and the International Atomic Energy Agency (IAEA) as the socalled EU 5+1 talks with Iran take place in Vienna, on July 3, 2014. (Photo by JOE KLAMAR/AFP via Getty Images) How an Iranian-linked influence campaign pivoted after Oct. 7 attack on Israel The multi-phase campaign seeks to divide and undermine Israeli society, according to a new Recorded Future analysis. May 8, 2024 By AJ Vicens
(Flavio Coelho/Getty Images) Hackers are increasingly hiding within services such as Slack and Trello to deploy malware A new analysis unpacks a wide array of malware abusing legitimate internet services and what defenders should do to stop it. Aug 16, 2023 By AJ Vicens
A Ukrainian serviceman inspects the ruins of a building suspected to have been destroyed after a missile strike near Kharkiv on July 5, 2022, amid the Russian invasion of Ukraine. (Photo by SERGEY BOBOK/AFP via Getty Images) Russian information operations focus on dividing Western coalition supporting Ukraine The Russian propaganda focuses on the threat that Ukrainian refugees could bring economic hardship to Europe. Jul 7, 2022 By Suzanne Smalley
This picture taken on Sept. 22, 2021 shows honor guards marching in front of the Chiang Kai-shek Memorial Hall in Taipei. Beijing views Taiwan as part of China. (Photo by SAM YEH/AFP via Getty Images) The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan China's certainly watching Russia's missteps in cyberspace, as well as the U.S. response. Jul 5, 2022 By Tim Starks
Aerial view of the city of San Jose, Costa Rica at night. (Getty Images) Latin America governments are prime targets for ransomware due to lack of resources, analysis argues The recent high-profile attacks on Costa Rica and Peru are examples of the dynamic, researchers say. Jun 16, 2022 By AJ Vicens
SolarWinds hackers set up phony media outlets to trick targets New infrastructure, old tricks. May 3, 2022 By Tonya Riley