Security News > 2024 > February

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The...

Interpol has arrested 31 people following a three-month operation to stamp out various types of cybercrime.Spanning 55 countries, from Albania to Australia, Operation Synergia identified more than 1,300 malicious servers, dismantling more than 70 percent of those used as part of command and control infrastructure that supported phishing, banking malware, and ransomware.

An international law enforcement operation code-named 'Synergia' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns. The Synergia operation identified and took down command and control servers between September and November 2023, with 60 law enforcement agencies from 55 countries participating in the operation.

The point is that unlike protocols that require a neutral third party to complete, or protocols that require that neutral third party to resolve disputes, self-enforcing protocols just work. Well, someone just solved gerrymandering in this way.

A former software engineer with the U.S. Central Intelligence Agency (CIA) has been sentenced to 40 years in prison by the Southern District of New York (SDNY) for transmitting classified...

Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation...

An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement...

Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and...

NIS2 outlines several security measures that will be considered minimal requirements for all member companies. Creating a minimum requirement for security protocols and shifting liability to company decision makers raises the stakes for security leaders and their teams.

The maximum attack power rose from 800 Gbps to 1.6 Tbps. UDP floods continue to dominate, constituting 62% of DDoS attacks. In Q3/Q4, the longest attack duration lasted 9 hours, and the average length of attack was approximately an hour.