
The Untold History of America’s Zero-Day Market
The lucrative business of dealing in code vulnerabilities is central to espionage and war planning, which is why brokers never spoke about it—until now. https://www.wired.com/story/untold-history-americas-zero-day-market/ […]

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years
The hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online. More than four […]

DDoS attack takes down EXMO cryptocurrency exchange servers
The servers of British cryptocurrency exchange EXMO were taken offline temporarily after being targeted in a distributed denial-of-service (DDoS) attack. https://www.bleepingcomputer.com/news/security/ddos-attack-takes-down-exmo-cryptocurrency-exchange-servers/ […]

FBI’s alert warns about using Windows 7 and TeamViewer
The FBI issues this week a Private Industry Notification (PIN) alert to warn companies about the risks of using out-of-date Windows 7 systems, poor account […]

Hackers break into research council servers, grant applications halted
Hackers gained access to the servers of the Dutch research council NWO, halting grant applications for the time being, the council said on Sunday. https://www.dutchnews.nl/news/2021/02/hackers-break-into-research-council-servers-grant-applications-halted/ […]

Singtel Suffers Zero-Day Cyberattack, Damage Unknown
The Tier 1 telecom giant was caught up in a coordinated, wide-ranging attack using unpatched security bugs in the Accellion legacy file-transfer platform. Singtel Suffers […]

Volkswagen taps Microsoft’s cloud to develop self-driving software
Volkswagen AG on Thursday said it will use Microsoft Corp’s cloud computing services to help it streamline its software development efforts for self-driving cars. https://cybernews.com/news/volkswagen-taps-microsofts-cloud-to-develop-self-driving-software/ […]

DDoS attacks intensify — Driven in part by COVID-19 and 5G
Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, widespread botnet activity, and some of the […]

World’s most dangerous malware EMOTET disrupted through global action
Law enforcement and judicial authorities worldwide have this week disrupted one of most significant botnets of the past decade: EMOTET. Investigators have now taken control […]

Hackers actively scanning for vulnerable SAP systems after exploit gets dropped on GitHub
Missing authentication flaw in lynchpin component targeted Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability […]

Here’s How SolarWinds Hackers Stayed Undetected for Long Enough
Microsoft on Wednesday shared more specifics about the tactics, techniques, and procedures (TTPs) adopted by the attackers behind the SolarWinds hack to stay under the […]

HelpSystems Seventh Annual IBM i Marketplace Survey Reveals Security Remains Top of Mind
Security concerns intensify with challenges over remote worker access HelpSystems today published its seventh annual IBM i Marketplace Survey, exploring how organizations use the IBM i platform […]

HelpSystems Acquires FileCatalyst to Continue Expansion of Cybersecurity and Automation Portfolio
HelpSystems announced today the acquisition of FileCatalyst, a leader in enterprise file transfer acceleration. FileCatalyst enables organizations working with extremely large files to optimize and […]

Intel Introduces Hardware-Based Ransomware Detection For Businesses
Reportedly, the known CPU maker Intel has joined hands with cybersecurity firm Cybereason to provide enhanced security to businesses. As announced, Intel will introduce hardware-based […]

Pfizer/BioNTech COVID-19 Vaccine Data Leaked by Hackers
Following the unceremonious cyberattack on the European Medicines Agency, cybercriminals have leaked Covid-19 vaccination data from Pfizer and BioNTech. The EMA is a decentralized agency […]

Cybersecurity Predictions for 2021
2020 was a hard teacher. It revealed our weaknesses, gaps and assumptions. It also highlighted our strengths, resourcefulness and resilience. „The lessons we learned this […]
