Jason Macuray
11 posts
Germany shuts down 47 cryptocurrency exchange services used by cybercriminals
German law enforcement has shut down 47 cryptocurrency exchange services that ransomware gangs and other cybercriminals used for money laundering.
DOJ indicts Chinese national for spear phishing campaign against NASA, FAA, Air Force
The Justice Department indicted a Chinese national for attempting to hack several aviation agencies across the U.S. government in order to steal software and code created by the National Aeronautics and Space Administration (NASA) and others.
Owner of only US platinum mine confirms data breach after ransomware claims
The owner of the only platinum and palladium mines in the U.S. confirmed that it experienced a cyberattack this summer that exposed the sensitive information of thousands of employees.
‘Clipper’ malware is being used to steal crypto, Binance warns
Binance is warning customers that malware is being used to manipulate withdrawal addresses in order to steal cryptocurrency, in a campaign that has led to “significant financial losses for victims.
Iran-linked hackers target Iraqi government in new campaign
A suspected Iranian state-sponsored threat actor has targeted Iraqi government organizations and other entities in the country as part of a new espionage campaign, researchers have found.
FTC issues $3 million fine for security camera firm, issuing penalties for a range of violations
The Federal Trade Commission (FTC) said it will fine the security camera company Verkada $2.95 million over allegations that the firm’s poor security practices led to a hacker breaking into customers’ devices as well as accessing personal data.
Ethical Hacking vs. Penetration Testing: Unraveling the Distinctions for Effective Cybersecurity Strategies
Ethical hacking and penetration testing serve different purposes. This writeup explains all what you need to know
Unplugged: Understanding the Socomec UPS Device Vulnerability Exploited by Hackers
Recent revelations about a vulnerability in Socomec UPS devices have raised concerns about the security of these critical systems.
Dissecting the HijackLoader Malware: Technical Analysis and Recent Attacks
Threat actors are constantly devising new and sophisticated malware to infiltrate systems and compromise sensitive data. One such threat is the HijackLoader malware, a versatile and evasive tool that has been used in recent attacks across the digital landscape.
Mom’s Meals issues “Notice of Data Event”: What to know and what to do
It took six months for notifications to start, and we still don’t know exactly what went down… but…