Hacker steals $223 million in Cetus Protocol cryptocurrency heist
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned.
·bleepingcomputer.com·
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
Dozens of malicious packages on NPM collect host and network data
Dozens of malicious packages on NPM collect host and network data
60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it to a Discord webhook controlled by the threat actor.
·bleepingcomputer.com·
Dozens of malicious packages on NPM collect host and network data
Sarcoma Ransomware: come proteggersi dalla doppia estorsione
Sarcoma Ransomware: come proteggersi dalla doppia estorsione
Dai dati del primo report del Malware Analysis Lab emerge la minaccia di Sarcoma Ransomware, che si distingue per l'uso di tattiche di attacco molto aggressive. Ecco come mitigare il rischio in azienda
·cybersecurity360.it·
Sarcoma Ransomware: come proteggersi dalla doppia estorsione
FBI warns of Luna Moth extortion attacks targeting law firms
FBI warns of Luna Moth extortion attacks targeting law firms
The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting U.S. law firms over the last two years in callback phishing and social engineering attacks.
·bleepingcomputer.com·
FBI warns of Luna Moth extortion attacks targeting law firms
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
U.S. and EU law enforcement seized more than $200 million and 144 kilograms of fentanyl or fentanyl-laced narcotics alongside 180 firearms as part of the international effort.
·therecord.media·
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
Dero, il cryptominer che sfrutta le API Docker per attaccare i container
Dero, il cryptominer che sfrutta le API Docker per attaccare i container
Identificata una sofisticata campagna di cyber attacchi che prende di mira gli ambienti containerizzati per distribuire il cryptominer Dero. Vediamo come funziona l'attacco e come difendersi
·cybersecurity360.it·
Dero, il cryptominer che sfrutta le API Docker per attaccare i container
M&S perde un terzo dei profitti a causa di un attacco informatico
M&S perde un terzo dei profitti a causa di un attacco informatico
La multinazionale britannica M&S ha annunciato che una perdità di 300 milioni di sterline in seguito all'attacco informatico che l'ha colpita a fine aprile.
·securityinfo.it·
M&S perde un terzo dei profitti a causa di un attacco informatico
Nato Intelligence, l’Artico come scelta geopolitica: le 4 aree chiave delle competenze
Nato Intelligence, l’Artico come scelta geopolitica: le 4 aree chiave delle competenze
L'ultimo summit dell'Alleanza atlantica ha messo al centro le difese delle terre artiche attraverso una strategia condivisa con l'Unione europea. Ecco i 4 pilastri della Nato Intelligence Enterprise (NIE) per garantire la sicurezza collettiva, combinando sicurezza, sostenibilità e governance multilaterale
·cybersecurity360.it·
Nato Intelligence, l’Artico come scelta geopolitica: le 4 aree chiave delle competenze
Dal GDPR al GDPR 2.0: le sfide della privacy digitale moderna
Dal GDPR al GDPR 2.0: le sfide della privacy digitale moderna
In concomitanza con il nono anniversario del GDPR, il settimo dalla sua piena applicazione, la Commissione UE pensa a un restyling. Le novità
·cybersecurity360.it·
Dal GDPR al GDPR 2.0: le sfide della privacy digitale moderna
Scarcity signals: Are rare activities red flags?
Scarcity signals: Are rare activities red flags?
Talos analyzed six months of PowerShell network telemetry and found that rare domains are over three times more likely to be malicious compared to frequently contacted ones.
·blog.talosintelligence.com·
Scarcity signals: Are rare activities red flags?
TikTok videos now push infostealer malware in ClickFix attacks
TikTok videos now push infostealer malware in ClickFix attacks
Cybercriminals are using TikTok videos to trick users into infecting themselves with Vidar and StealC information-stealing malware in ClickFix attacks.
·bleepingcomputer.com·
TikTok videos now push infostealer malware in ClickFix attacks
Windows 11 Notepad gets AI-powered text writing capabilities
Windows 11 Notepad gets AI-powered text writing capabilities
Microsoft is testing a new AI-powered text generation feature in Notepad that can let Windows Insiders create content based on custom prompts.
·bleepingcomputer.com·
Windows 11 Notepad gets AI-powered text writing capabilities
AI Officer: un presidio di legalità per l’uso responsabile dell’AI
AI Officer: un presidio di legalità per l’uso responsabile dell’AI
Sebbene nel Regolamento europeo sull’intelligenza artificiale non ne preveda espressamente la nomina, il profilo dell'AI Officer emerge con competenze che devono toccare sia la sfera legale che quella tecnologica
·cybersecurity360.it·
AI Officer: un presidio di legalità per l’uso responsabile dell’AI
Police takes down 300 servers in ransomware supply-chain crackdown
Police takes down 300 servers in ransomware supply-chain crackdown
In the latest phase of Operation Endgame, an international law enforcement operation, national authorities from seven countries seized 300 servers and 650 domains used to launch ransomware attacks.
·bleepingcomputer.com·
Police takes down 300 servers in ransomware supply-chain crackdown
Claude 4 benchmarks show improvements, but context is still 200K
Claude 4 benchmarks show improvements, but context is still 200K
Today, OpenAI rival Anthropic announced Claude 4 models, which are significantly better than Claude 3 in benchmarks, but we're left disappointed with the same 200,000 context window limit.
·bleepingcomputer.com·
Claude 4 benchmarks show improvements, but context is still 200K
Oops: DanaBot Malware Devs Infected Their Own PCs
Oops: DanaBot Malware Devs Infected Their Own PCs
The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot…
·krebsonsecurity.com·
Oops: DanaBot Malware Devs Infected Their Own PCs
DOJ charges man allegedly behind Qakbot malware
DOJ charges man allegedly behind Qakbot malware
The alleged leader of the cybercriminal gang behind the Qakbot malware, which was used by many high-profile ransomware gangs, has been indicted by the U.S. Justice Department.
·therecord.media·
DOJ charges man allegedly behind Qakbot malware
US indicts leader of Qakbot botnet linked to ransomware attacks
US indicts leader of Qakbot botnet linked to ransomware attacks
The U.S. government has indicted Russian national Rustam Rafailevich Gallyamov, the leader of the Qakbot botnet malware operation that compromised over 700,000 computers and enabled ransomware attacks.
·bleepingcomputer.com·
US indicts leader of Qakbot botnet linked to ransomware attacks
Ghosted by a cybercriminal
Ghosted by a cybercriminal
Hazel observes that cybercriminals often fumble teamwork, with fragile alliances crumbling over missed messages. Plus, how UAT-6382 is exploiting Cityworks and what you can do to stay secure.
·blog.talosintelligence.com·
Ghosted by a cybercriminal
Chinese-speaking hackers targeting US municipalities with Cityworks bug
Chinese-speaking hackers targeting US municipalities with Cityworks bug
Since January, cybersecurity experts have seen Chinese-speaking hackers exploiting a bug impacting a tool used by local governments to manage critical infrastructure assets and other services.
·therecord.media·
Chinese-speaking hackers targeting US municipalities with Cityworks bug