Gootloader's evolution. Yandex source code leaked. New GRU wiper malware active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system.
Hive ransomware gang taken down. Killnet continues reprisals against German targets. CISA releases eight ICS advisories. CISA also adds an entry to its Known Exploited Vulnerabilities Catalog.
Joint advisory warns of remote monitoring and management software abuse. DRAGONBRIDGE spam network disrupted. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs.
Spoofing vulnerability discovered in Windows CryptoAPI. Python-based malware distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and security. Russian hacktivist auxiliaries hit German targets. Private sector support for Ukraine's cyber defense. CISA issues two ICS advisories.
DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. Cisco study finds organizations see positive returns from investment in privacy. IoT supply chain threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. What's the hacktivist's postwar future?