North Korea-linked hackers carried out a spear-phishing campaign that used the South Korean messaging platform KakaoTalk to ...
William C. Fox on MSN
How North Korean hacking actually works - The hidden cyber army of North Korea
The WannaCry ransomware attack spread across the world in 2017. Hospitals, businesses, and governments were suddenly locked out of their own systems. Investigators later linked the attack to North ...
As users (and detection tools) have gotten better at identifying the signs of a malware infection and savvy enough to avoid them in the first place, some cybercriminals have changed tactics.
Historically, Iran has conducted some of the most infamous “wiper” cyberattacks on national enemies, aiming to simply erase ...
Pro-Iranian hackers are targeting sites in the Middle East and starting to stretch into the United States during the war.
A puzzling part of the ongoing war is that Iran has largely been visibly absent in the cyber domain. The nation has long been regarded as a capable cyber power and although the western cyber-security ...
A nation-state group claims to have wiped 200,000 devices in 79 countries after a possible Microsoft Intune compromise.
Fresh research from the University of East Anglia (UEA) could transform how the NHS protects patients' medical images from cyberattacks. Computer scientists have developed a breakthrough way to ...
Leading medical technology company Stryker has been hit by a wiper malware attack claimed by Handala, an Iranian-linked and pro-Palestinian hacktivist group.
Cybersecurity executive Chaim Mazal says joining a hacker community as a kid helped jump-start his career.
Protecting against individual hackers was difficult enough, but system admins everywhere may have an even harder time with AI-enhanced hacking.
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results