Search results

Is the Groove ransomware gang is a motley crew of disgruntled hackers, or a hoax?

by Tim Starks • 3 months ago

The group emerges as cracks form in the ransomware-as-a-service model.

Researchers show how to tamper with medication in popular infusion pumps using software flaws

by Sean Lyngaas • 3 months ago

The research illustrates the challenge of securing devices conceived decades ago from 21st-century digital threats.

T-Mobile confirms breach exposed sensitive data of more than 40 million people

by Tonya Riley • 4 months ago

The breach is the company's fifth since 2018.

John McAfee found dead after Spanish court approved extradition to US

by Jeff Stone • 5 months ago

McAfee, 75, was the creator of antivirus software and accused of multiple high profile crimes.

The kinds of cyber changes one McAfee expert expects to continue over the next year

by CyberScoop Staff • 6 months ago

Rob Lalumondier, Senior Director of Federal Civilian at McAfee joins other influential security leaders to discuss cybersecurity trends and strategies as both public and private sector organizations meet today’s most pressing security challenges.

Irish officials analyze decryption tool as long recovery process from ransomware continues

by Sean Lyngaas • 7 months ago

FireEye is involved in the incident response, a spokesperson said.

Irish officials warn of ongoing disruptions to health system, long recovery following ransomware incident

by Sean Lyngaas • 7 months ago

The incident, which Irish officials have blamed on Conti ransomware, has rocked the public health system.

Suspected Chinese hackers are breaking into nearby military targets

by Shannon Vavra • 7 months ago

The suspected PLA hackers are back in action.

Suspected North Korean hackers set up fake company to target researchers, Google says

by Shannon Vavra • 8 months ago

Their hacking has been exposed before, but they're not backing down.

How zero trust helped insulate Splunk from supply chain attack

by CyberScoop Staff • 9 months ago

The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.