Search results

FBI, DHS to go public with suspected North Korean hacking tools

by Shannon Vavra • 3 weeks ago

The report drops on the third anniversary of the WannaCry attack, which the U.S. blamed on North Korea.

Hackers spoof SBA to try to compromise companies' computers

by Sean Lyngaas • 1 month ago

The hackers are exploiting businesses' reliance on digital updates from the federal government.

Hackers posed as Egyptian oil contractor in apparent spy campaign ahead of OPEC meeting

by Jeff Stone • 1 month ago

The number of attempted attacks surged before a highly anticipated meeting between Saudi Arabia, Russia and other oil-producing nations.

How the suspected Equifax hackers covered their tracks

by Jeff Stone • 4 months ago

At one point Justice Department personnel considered issuing a subpeona for Equifax documents.

Hamas-linked hackers exploit current events to spy on rival Palestinian officials, researchers say

by Sean Lyngaas • 4 months ago

Enticing emails come with PDF files that contain a new remote access trojan, according to Cybereason.

The Cyber speaks: What will actually happen in 2020

by cyber_admin • 6 months ago

The only true way to predict computer security is to hear from the machines themselves.

For criminal hackers, Brazilian hotel networks appear to be easy targets

by Sean Lyngaas • 6 months ago

The findings underscore Brazil’s longstanding struggles with cybercrime.

Notorious FIN7 crooks have new malicious code up their sleeves

by Sean Lyngaas • 8 months ago

It's the latest sign that FIN7 is resurgent.

Why Cyber Command’s latest warning is a win for the government's information sharing efforts

by Shannon Vavra • 11 months ago

New details uncovered by CyberScoop show how much coordination went into Cyber Command's public VirusTotal upload of an Iran-linked tool.

Dozens of Facebook pages about current events in Libya were linked to malware

by Jeff Stone • 11 months ago

Facebook removed the pages — which collectively had hundreds of thousands of followers — after notification from researchers, Check Point said.

TwitterFacebookLinkedInRedditGoogle Gmail