Tallahassee Memorial HealthCare (TMH) has suffered a ransomware attack. It has led to the shutdown of its IT systems and the suspension of non-emergency procedures. All of TMH’s network systems went offline. The healthcare provider has stated that the attack…
Latest posts - Page 17
The Linux version of Royal Ransomware targets VMware ESXi servers.
Targeting VMware ESXi virtual computers, Royal Ransomware is the most recent ransomware operation to add capabilities for encrypting Linux devices to its most recent malware strains. Similar Linux ransomware encryptors have been made available by numerous different gangs, including Black…
North Korean Hacking Group in Spotlight
Finnish cybersecurity firm WithSecure has uncovered a new cyber espionage campaign by the North Korean hacking group Lazarus. The name of the group is “No Pineapple.” The group stole 100GB of data from several organizations. It includes medical research and…
Hackers penetrate gaming companies using the new IceBreaker software.
Researchers have given the backdoor IceBreaker the name because it appears to be used by hackers to attack internet play and gambling businesses. The compromising technique depends on convincing customer care representatives to open infected screenshots that a threat actor…
1,800 Android Phishing Kits for Sale
The internet is a dark and dangerous place, and it just got a little bit darker. InTheBox, a notorious threat actor, is making waves in the Russian cybercrime world. Android phishing is on boom. They are offering a massive inventory…
Google Fi data breach – hackers carry SIM swap attacks.
Customers of Google Fi, the company’s U.S.-only mobile internet and telecoms service, have been notified that a data breach at one of its primary network providers may have exposed personal information. Customers of Google Fi received notifications from Google this…
Microsoft Defender now detecting Linux intrusions
Microsoft has made a significant move. To enhance the security of Linux-based devices with the addition of device isolation support to Microsoft Defender for Endpoint (MDE). Enterprise administrators now have the ability to manually isolate Linux machines enrolled in MDE.…
KeePass vulnerabilities permit sneaky password stealing.
The KeePass development team is contesting what a recently discovered weakness that enables attackers to export the entire database in plain text covertly is. With KeePass, a well-liked open-source password manager. You can manage your passwords locally rather than using…
Dark Web Hiring: Top Jobs Paying $20k
Cybercrime is no longer just a hobby for tech-savvy individuals; it has now become a business. Now it has job opportunities on the dark web that offer competitive salaries, paid time off, and sick leave. The latest report by Kaspersky…
Hackers Using Russia’s Malware
New Data-Wiping Malware SwiftSlicer Attributed to Russian Sandworm GroupCybersecurity experts have uncovered a new data-wiping malware named SwiftSlicer. It designs to overwrite essential files used by the Windows operating system. The malware came to light during a recent cyberattack in…