LockBit makes 5 new victims after disruption by police
LockBit restarted its operations after receiving a crackdown from police forces last week. The ransomware group launched a new website over the weekend to extort the victims it makes. However, the conclusion about the international action against LockBit is positive. How does the operation impact t... Read more
Spyware found on MEPs’ phones in defense and security committee
Two phones of European parliamentarians have shown traces of spyware. The subcommittee focused on security and defense appears to have been targeted by state hackers, but the culprit is unknown.
The discovery was reported by Politico, which warned back in December that the European Parliament's ... Read more
Google Cloud Run abused for large-scale attacks on financial institutions
Cisco Talos recently found that Google Cloud Run has been abused on a large scale. Attackers are using this service to distribute high volumes of banking trojans, particularly to target financial institutions in Latin America.
Recent research by Cisco Talos shows that cybercriminals have been ab... Read more
1Password consolidates with Kolide endpoint security platform
1Password recently acquired Kolide. With the acquisition, 1 Password aims to expand its portfolio of solutions to provide companies with secure access to applications and data.
With the acquisition, for which no further details were disclosed, 1Password gains a specialist that provides security ... Read more
IBM: Cloud use makes Europe biggest target of hackers in 2023
Recent research by IBM Security X-Force finds that Europe faced the most cyber attacks in 2023. High cloud adoption that increases the attack surface is the main reason.
The annual IBM X-Force Threat Intelligence Index 2024 shows that Europe suffered the most cyber attacks of any world region in... Read more
CrowdStrike: Cloud intrusion takes huge leap
The total number of cloud intrusion incidents increased by 75 per cent in 2023, significantly surpassing 2022.
That's according to figures from CrowdStrike. Cloud intrusion includes unwanted and unauthorized access to cloud environments and applications. CrowdStrike classifies the majority of cl... Read more
Check Point sets new standard with Quantum Force firewalls
New Security Gateways from Check Point Software Technologies meet market demands and offer ever-higher performance.
The pressure on the network is constantly increasing, especially when it comes to cybersecurity. Performance must be there, but it must always be secure. Network security plays an ... Read more
Internet can easily be disrupted due to an old design flaw
A design flaw in security extensions on the network protocol allows hackers to cut off large parts of the world from the internet. Researchers clarified the danger with the development of a KeyTrap attack that requires only a single DNS packet.
The network protocol contains an easily exploitabl... Read more
LockBit ransomware is hampered by police departments, but won’t stop -update
The hacker collective LockBit already has thousands of victims to its name. Drawing this much attention causes police departments to get eager to stop the criminal organization. Steps have recently been taken to that end, with a joint operation by Europol, the FBI and the British security services ... Read more