Microsoft said today it spotted a cybercrime operation abusing contact forms on legitimate websites to target companies and their workers in attempts to infect them with the IcedID malware.
The group behind the Maze and Egregor ransomware operations are believed to have earned at least $75 million worth of Bitcoin from ransom payments following intrusions at companies all over the world.
Fitch Ratings, one of the “Big Three” credit rating agencies that assesses the creditworthiness of bonds, companies, and governments, published an alert Thursday warning that cyberattacks could pose a “material risk” to water and sewer utilities and potentially impact their ability to repay debt. The alert follows multiple reports of cybersecurity incidents affecting water utilities. In February, city officials in Oldsmar, Florida, said a hacker attempted to poison the local water supply by changing the concentration of sodium hydroxide at a water treatment plant to toxic levels…
Despite having its operations publicly exposed in the mid-2010s, a Chinese malware gang has not faced any legal consequences for their actions and has continued to operate undisturbed, spreading Android banking trojans inside South Korea.
Unpatched Fortinet VPN devices are being hacked to deploy a new strain of ransomware inside corporate networks, Russian security firm Kaspersky said today.
After experiencing a brief dip at the beginning of the year, ransomware attacks are showing signs of a resurgence with
A Missouri man was sentenced today to 12 years in prison after he attempted to buy a deadly poisonous chemical from the dark web during an undercover FBI operation. The suspect, a 46-year-old man named Jason William Siesser of Columbia, Missouri, was also denied parole due to the severity of his crime.
A Dutch man was sentenced last week to 27 months in prison and a €10,000 ($11,800) fine for breaking into 13,762 accounts at Dutch online stores. The man, a 27-year-old from the Dutch city of Arnhem, was found guilty of buying 3.7 million login credentials and using automated tools to test if the logins were still valid.