cyber2security blog

Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms

An OpSec slip from the North Korean threat group helps researchers…

We can’t rely on goodwill to protect our critical infrastructure

How far is too far for a hacker? Earlier this year the Lockbit…

Russia-backed hacker group Gamaredon attacking Ukraine with info-stealing malware

The Russian-sponsored hacker group known as Gamaredon continues…

Hacked Electrify America Charger Exposes Major Cybersecurity Risk

After a person was able to gain access to an Electrify America charger…

New Russian-Backed Gamaredon’s Spyware Variants Targeting Ukrainian Authorities

The State Cyber Protection Centre (SCPC) of Ukraine has called…

The Growing Pains of Global Compliance Standards for Financial Institutions

It’s no surprise that financial organizations are among the…

Ancient Windows Server 2008 in use in Berlin administration

The Berlin administration is repeatedly criticized. It has now…

Cybercrime is world’s third-largest economy thanks to booming black market

Ransomware-as-a-service and malware sold on the dark web are…

Cyberattacks: the nightmare of business leaders… and their insurers

Caught between the rise of online attacks and greater caution…

TruthFinder, Instant Checkmate confirm data breach affecting 20M customers

PeopleConnect, the owners of the TruthFinder and Instant Checkmate…

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

The Russia-linked LockBit ransomware group claims to be behind…

Gerstetter town hall is affected by a cyber attack

The Gerstetter town hall fell victim to a cyber attack on Thursday. As…

Former Ubiquiti dev pleads guilty to trying to extort his employer

Nickolas Sharp, a former Ubiquiti employee who managed the networking…

ChatGPT brings new cyber risks. Businesses need to adapt their level of security

A joint study by Europol, the UN Institute for Interregional…

Embarrassing error reveals North Korean spy attacks

Presumably on behalf of North Korea, hackers penetrated numerous…

[EXCLUSIVE] South may place sanctions on North hacking groups

South Korea may sanction the North over illicit cyber activities,…

Potsdam’s town hall goes online again – the second attempt

Potsdam. The Potsdam city administration has announced that…

City of London traders hit by Russia-linked cyber attack

Trading in the City of London has been plunged into chaos after…

Nagold company falls victim to a cyber attack

Nagold's largest employer fell victim to a cyber attack on Thursday. Häfele…

Florida hospital takes IT systems offline after cyberattack

Tallahassee Memorial HealthCare (TMH) has taken its IT systems…

Netflix Reveals How Password Sharing Crackdown Will Be Enforced

The Netflix password sharing crackdown is about to begin, but…

New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently…

Atlassian warns of critical Jira Service Management auth flaw

A critical vulnerability in Atlassian's Jira Service Management…

Most Important Computer Forensics Tools for 2023

Computer Forensics tools are more often used by security industries…

This Google Ads campaign pushes malware that your antivirus can’t pick up

Cybersecurity researchers have spotted a new advertising campaign…

This is how Google’s internal hackers work

Hoodies, plasma lamps, digital arson. Daniel Fabian, head of…

ChatGPT: More curse than blessing? That’s what the security industry says

A distribution of ChatGPT via the cloud: This was announced by…

Tim Hortons officially settles data breach lawsuit with FREE food

Back in July, some Tim Hortons app users were surprised to find…

Hackers target Zurich university with ‘professional’ cyberattack

The University of Zurich has been hit with a cyberattack that…

China’s Origin Quantum Delivers a Commercial 24-Qubit Quantum Computer

The Wuyuan supercomputer uses superconducting chip technology. China-based…

Dropbox Hacked – Attackers Stolen 130 GitHub Repositories

In a recent disclosure, Dropbox revealed that a security breach…

Qnap-NAS: Critical vulnerability allows malicious code to be injected

Attackers could inject and execute malicious code in Qnap network…

Information on Russian crimes in Bucha appears on screen in Russian Hermitage

The administration of the Russian Hermitage museum in…

A Chinese balloon exposes a massive vulnerability

Raises the question: Are US air defenses useless? – but the…

Comment on the cloud failure in MS: Is the patient already dead or just injured?

The recent Azure outage has shown one thing above all: Current…

Over 1,800 Android phishing forms for sale on cybercrime market

A threat actor named InTheBox is promoting on Russian cybercrime…

Hackers use Golang source code interpreter to evade detection

A Chinese-speaking hacking group tracked as ‘DragonSpark’…

New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers

"These attack campaigns appear to exploit CVE-2021-21974, for…

HOW TO LAUNCH COMMAND PROMPT AND POWERSHELL FROM MS PAINT

This guide will show you how you can launch cmd and Powershell…

Threat activity increasing around Fortinet VPN vulnerability

Following public disclosure of the critical VPN flaw in December,…

North Korean Hacker Group Targeted Medical & Energy Sectors

The North Korean Lazarus hacking group has been identified as…

FURNITURE MANUFACTURER HÄFELE OFFLINE The next hack attack?

Nobody can be reached at Häfele in Baden-Württemberg anymore,…

Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

Admins, hosting providers, and the French Computer Emergency…

Week 4: Malware in Hotels – Booking data is used to scam hotel guests

January 31, 2023 - In the fourth week of 2023, the number of…

Royal Ransomware Targets Linux Devices

Targeting Vmware ESXi virtual machines Royal Ransomware is the…

Hackers are increasingly using code packages for attacks

Check Point security researchers warn: Infected packages with…

Ransomware: hundreds of VMware ESXi servers caught in a vast campaign

Triggered this Friday, February 3, a vast infection campaign…

FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection

An ongoing malvertising campaign is being used to distribute…

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

The maintainers of OpenSSH have released OpenSSH 9.2 to address…

Apparent cyberattack forces Florida hospital system to divert some emergency patients to other facilities

(CNN) An apparent cyberattack has forced a network of Florida…

VMware ESXi ransomware attacks continue: 500+ hit

Security researchers are reporting an explosion in the compromise…

Attack on Italy: 2100 compromised ESXi of which 20 Italians, including UNINA. Redemption of 2 bitcoins

As we reported earlier, cybercriminals have launched a scan for…

Cyber ​​Attacks on the Supply Chain?

Digitization in all areas of private and business life and the…

What is Command and Control(C2) Server – A Detailed Overview

Like a regular system holder, you might be wondering why is your…

Data Recovery- How To Restore Deleted Files of USB

Data Recovery- Restore deleted files of USB. Ooppss! Have you deleted an…

Crypto hacks stole record $3.8 billion in 2022, led by North Korea groups – report

SEOUL, Feb 1 (Reuters) - Last year was the worst on record for…

New Dingo crypto token found charging a 99% transaction fee

Researchers at IT security company Check Point security have…

Why cybercrooks love Telegram Messenger

The Telegram text and video messaging service has become a “thriving…