Securing your network for the holidays
Tips to better protect your network over extended breaks.
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools,…
When an unfounded legal threat comes from someone in your own community, it seems especially offensive and disappointing. In this case, a security journalist received a legal threat from a cybersecurity news site. When SuspectFile journalist Marco A. De Felice was sent a superinjunction from the High Court in the U.K. in response to his……
Daryna Antoniuk reports: Hungarian police have arrested a man suspected of carrying out a prolonged series of cyberattacks against independent media outlets in Hungary and abroad, authorities said on Monday. The 23-year-old suspect from Budapest is accused of launching distributed denial-of-service (DDoS) attacks that disrupted access to at least half a dozen Hungarian news sites beginning in…
Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed by Kaspersky in 2024, spread across Bangladesh, Cambodia, Djibouti, Egypt, the United Arab Emirates, and Vietnam. Other targets of interest include nuclear power plants and…
The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals in the United States. Rami Khaled Ahmed of Sana’a, Yemen, has been charged with one count of conspiracy, one count of intentional damage to a…
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” Socket researcher…