The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions. The post Ransomware Group Takes Credit for Lee Enterprises Attack appeared first on SecurityWeek. This article has been…
Category: securityweek
Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago. The post Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes appeared first on SecurityWeek. This article has…
Microsoft Names Suspects in Lawsuit Against AI Hackers
In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek. This article has been indexed from…
26 New Threat Groups Spotted in 2024: CrowdStrike
CrowdStrike has published its 2025 Global Threat Report, which warns of faster breakout time and an increase in Chinese activity. The post 26 New Threat Groups Spotted in 2024: CrowdStrike appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Hacker Behind Over 90 Data Leaks Arrested in Thailand
A Singaporean man accused of being a hacker responsible for over 90 data leaks has been arrested in Thailand. The post Hacker Behind Over 90 Data Leaks Arrested in Thailand appeared first on SecurityWeek. This article has been indexed from…
Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand
SecurityWeek’s 2025 Ransomware Resilience & Recovery Summit tool place on February 26th as a fully immersive virtual event. The post Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand appeared first on SecurityWeek. This article has…
The Hidden Cost of Compliance: When Regulations Weaken Security
The current state of regulation and the overwhelming burden it brings to most enterprises is a discussion worth having The post The Hidden Cost of Compliance: When Regulations Weaken Security appeared first on SecurityWeek. This article has been indexed from…
Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw
The websites of dozens of major private and government organizations have been abused in a massive spam campaign that involves exploitation of a vulnerability affecting widely used virtual tour software. The attacks were observed recently by researcher Oleg Zaytsev who…
Cisco Patches Vulnerabilities in Nexus Switches
Cisco has patched command injection and DoS vulnerabilities affecting some of its Nexus switches, including a high-severity flaw. The post Cisco Patches Vulnerabilities in Nexus Switches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves?
Security-oriented news often stays within the security community, that is until it hits home, or often millions of homes. We’ve most recently heard about breaches at National Public Data and Ticketmaster, but there are names from the past that might…