Microsoft Warns Windows Users Of Ongoing Russian Hack Attack
Lifeboat » Cybercrime
by Genevieve Klien
1d ago
Russian military intelligence hackers have been exploiting a Windows vulnerability since at least 2020 according to a new Microsoft report. Here’s what you need to know. Read more ..read more
Visit website
Hackers are using developing countries for ransomware practice
Lifeboat » Cybercrime
by Genevieve Klien
1d ago
Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and South America before targeting richer countries that have more sophisticated security methods. Hackers have adopted a “strategy” of infiltrating systems in the developing world before moving to higher-value targets such as in North America and Europe, according to a report published on Wednesday by cyber security firm Performanta. “Adversaries are using developing countries as a platform where they can test their malicious programs before the more resourceful countries are targeted,” the company ..read more
Visit website
China Working on Super-Fast Submarines Powered by Lasers
Lifeboat » Cybercrime
by Kelvin Dafiaghor
1d ago
In China, scientists say they’re developing technology that uses lasers to propel submarines nearly as fast as a jet engine. As the South China Morning Post reports, engineers at the Harbin Engineering University in Heilongjiang province — where, notably, China’s first experimental submarine was developed — claim that the country’s military is close to achieving this colossal feat. The idea behind the burgeoning technology is ingenious: lasers generate plasma underwater, which then creates a so-called “detonation wave” to propel a submarine vessel forward. As the SCMP notes, Japanese research ..read more
Visit website
Two-dimensional nanomaterial sets expansion record
Lifeboat » Cybercrime
by Saúl Morales Rodriguéz
1w ago
It is a common hack to stretch a balloon out to make it easier to inflate. When the balloon stretches, the width crosswise shrinks to the size of a string. Noah Stocek, a Ph.D. student collaborating with Western physicist Giovanni Fanchini, has developed a new nanomaterial that demonstrates the opposite of this phenomenon. Read more ..read more
Visit website
The experimental demonstration of a verifiable blind quantum computing protocol
Lifeboat » Cybercrime
by Cecile G. Tamura
2w ago
Quantum computers, systems that process and store information leveraging quantum mechanical phenomena, could eventually outperform classical computers on numerous tasks. Among other things, these computers could allow researchers to tackle complex optimization problems, speed up drug discovery and better protect users against cyber-security threats. Read more ..read more
Visit website
Hackers stole 340,000 Social Security numbers from government consulting firm
Lifeboat » Cybercrime
by Genevieve Klien
2w ago
GMA provides economic and litigation support to companies and U.S. government agencies, including the U.S. Department of Justice, bringing civil litigation. According to its data breach notice, GMA told affected individuals that their personal information “was obtained by the U.S. Department of Justice (“DOJ”) as part of a civil litigation matter” supported by GMA. The reasons and target of the DOJ’s civil litigation are not known. A spokesperson for the Justice Department did not respond to a request for comment. GMA said that individuals notified of the data breach are “not the subject of t ..read more
Visit website
NSA Expert: Quantum Computing to Enter Workforce in 3 to 5 Years
Lifeboat » Cybercrime
by Shubham Ghosh Roy
2w ago
A national security expert predicts practical quantum computing tools are just three to five years away from integration into the workforce, NextGov is reporting. Neal Ziring, the Technical Director of the National Security Agency’s (NSA) Cybersecurity Directorate, made the forecast during a recent public sector cybersecurity event hosted by Palo Alto Networks in Palo Alto. As reported by NextGov, Ziring expects the devices to be accessible predominantly through cloud-based platforms. Ziring added that the impracticality and cost-prohibitive nature of would put on-premise installations for qu ..read more
Visit website
Watch Out for ‘Latrodectus’ — This Malware Could Be In Your Inbox
Lifeboat » Cybercrime
by Saúl Morales Rodriguéz
2w ago
‘Latrodectus’ strikes via phishing emails. This powerful downloader can execute commands, evade detection, and pave the way for further attacks. Read more ..read more
Visit website
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
Lifeboat » Cybercrime
by Saúl Morales Rodriguéz
2w ago
Latin America targeted in new phishing attack. Emails contain malicious HTML files disguised as invoices. Read more ..read more
Visit website
Hackers deploy crypto drainers on thousands of WordPress sites
Lifeboat » Cybercrime
by Saúl Morales Rodriguéz
2w ago
Almost 2,000 hacked WordPress sites now display fake NFT and discount pop-ups to trick visitors into connecting their wallets to crypto drainers that automatically steal funds. Website security firm Sucuri disclosed last month that hackers had compromised approximately 1,000 WordPress sites to promote crypto drainers, which they promoted via malvertising and YouTube videos. It is believed that the threat actors were unsuccessful with their original campaign and began deploying news scripts on the compromised sites to turn visitors’ web browsers into tools for brute-forcing the admin passwords ..read more
Visit website

Follow Lifeboat » Cybercrime on FeedSpot

Continue with Google
Continue with Apple
OR