Ransomware Hits Health Care Once Again, 45,000 Patient Records Compromised in Blue Springs Breach
More and more, ransomware attacks are targeting one specific industry – health care. As detailed in our McAfee Labs Threats Report: March 2018, health care experienced a dramatic 210% overall increase in cyber incidents in 2017. Unfortunately, 2018 is showing no signs of slowing. In fact, just this week it was revealed that patient records […] more…Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day, the popular social media app Timehop was hacked – as cybercriminals set their sights on the company’s servers, rather than enjoying hot dogs and sparklers. The attack affects a whopping 21 million Timehop users and […] more…Saks, Lord & Taylor Stores Hit by Data Breach
A data breach at Saks Fifth Avenue and Lord & Taylor stores in North America exposed customer payment card data, parent company Hudson’s Bay Company (HBC) announced on Sunday. The hack, which also impacted its discount store brand Saks OFF 5TH, did not appear to affect HBC’s e-commerce or other digital platforms. “We identified the […] more…Ransomware Hits City of Atlanta
A ransomware attack — possibly a variant of SamSam — has affected some customer-facing applications and some internal services at the City of Atlanta. The FBI and incident response teams from Microsoft and Cisco are investigating. The city’s police department, water services and airport are not affected. The attack was detected early on Thursday morning. […] more…Taiwan Hit With Micropayment Fraud via Android Malware
In our 1Q Threat roundup report, we noted that the number of mobile malware and high-risk applications reached the two-million mark and is rapidly growing. In our monitoring of the mobile threat landscape, we have recently discovered an Android malware that is spreading fast in Taiwan, detected as ANDROIDOS_RUSMS.A. Mobile users fall victim via SMS spam attack. Users receive […] more…Banking Trojan Trend Hits Japan Hard
In its recent report, National Police Agency mentioned that the current estimated total cost of unauthorized transactions suffered by Japanese users reached 1.417 billion yen during the period of January-May 2014. In comparison the estimated total damage cost from these kinds of threats was 1.406 billion yen in 2013. Data released by Japanese Bankers Association also gives […] more…NSA Revelations Cast Doubt on the Entire Tech Industry
Six years ago, two Microsoft cryptography researchers discovered some weirdness in an obscure cryptography standard authored by the National Security Agency. There was a bug in a government-standard random number generator that could be used to encrypt data. The researchers, Dan Shumow and Niels Ferguson, found that the number generator appeared to have been built […] more…Hit the brakes! Did Your Car Just Get Hacked?
Could your car be the next target of a cyber attack? You might not think so, but new research has shown otherwise. The overall safety of your vehicle used to be rather straightforward to maintain with tune-ups, replaced brake pads, flushes and other scheduled upkeep. Unfortunately, with the incorporation of computer systems into newer car […] more…Cross site scripting (XSS) Research Paper By Aarshit Mittal and Harsha Vardhan Boppana
Cross site scripting (XSS) By Aarshit Mittal and Harsha Vardhan BoppanaCross site scripting is a web application based attack generally found in online services, pages of the websites the attack is a temporary attack but can be used by a black hat hacker or a financial cyber fraud for a permanent attack on user’s confidential data. […] more…Cross site scripting (XSS) Research Paper By Aarshit Mittal and Harsha Vardhan Bopanna
Cross site scripting (XSS) By Aarshit Mittal and Harsha Vardhan BopannaCross site scripting is a web application based attack generally found in online services, pages of the websites the attack is a temporary attack but can be used by a black hat hacker or a financial cyber fraud for a permanent attack on user’s confidential […] more…18 tricks for more efficient Android messaging
No matter what type of Android phone you carry or how you usually use it, one thing is a near-universal constant: You’re gonna spend a ton of time messing with messages. The messages may be from clients, colleagues, or your cousin Crissy from Cleveland (damn it, Crissy!). But regardless of who sends ’em or what […] more…VTPRACTITIONERS{ACRONIS}: Tracking FileFix, Shadow Vector, and SideWinder
Introduction We have recently started a new blog series called #VTPRACTITIONERS. This series aims to share with the community what other practitioners are able to research using VirusTotal from a technical point of view. Our first blog saw our colleagues at SEQRITE tracking UNG0002, Silent Lynx, and DragonClone. In this new post, Acronis Threat Research […] more…Reversing at Scale: AI-Powered Malware Detection for Apple’s Binaries
TL;DR: We ran our new AI-based Mach-O analysis pipeline in production, no metadata, no prior detections, just raw Apple binaries. On Oct 18, 2025, out of 9,981 first-seen samples, VT Code Insight surfaced multiple real Mac and iOS malware cases that had 0 antivirus detections at submission time, including a multi-stage AppleScript infostealer and an […] more…Apple’s war in Europe
Some say good government is less government. Others have a different point of view. But the least you should be able to expect from any kind of governance is that following one law doesn’t force you to break another. That is, unless you’re Apple and the laws are made in Europe. In a letter seen by Computerworld, […] more…The AWS outage post-mortem is more revealing in what it doesn’t say
When AWS suffered a series of cascading failures that crashed its systems for hours in late October, the industry was once again reminded of its extreme dependence on major hyperscalers. (As if to prove the point, Microsoft suffered a similar collapse a few days later.) The incident also shed an uncomfortable light on how fragile these massive environments have become. […] more…The revised Microsoft-OpenAI deal teases far more than it delivers
When Microsoft and OpenAI announced their revised AI deal on Thursday, it reduced Microsoft’s ownership share of OpenAI, but seemed to give it everything that it wanted in exchange, analysts said. Well, everything other than AGI, which Microsoft doesn’t really care about. The announcement of the revised details indicated a change in the nature of […] more…More information
- CODEGATE 2014
- AMTSO Releases Sandbox Evaluation Framework
- 7 security incidents that cost CISOs their jobs
- Hacker Conversations: Alex Ionescu
- Microsoft Internet Explorer VBScript Engine CVE-2019-1485 Remote Code Execution Vulnerability
- They fought the law, the law won: Recent arrests and convictions of online criminals
- Risks For E-commerce Site Owners Through the Holidays
- How the new Matter standard could unleash innovation in IoT
- FBCS Data Breach Impact Grows to 3.2 Million Individuals
- Biden Says ‘Looking’ at Russia Retaliation Over Cyberattack