2022 begins with the continuing detection and mitigation of Log4j vulnerabilities. Ransomware exploitation of Log4j vulnerabilities. Another nation-state actor exploits Log4j issues. Internet lockdown in Kazakhstan. DPRK operators are phishing for Russian diplomats. Tehran-aligned hacktivists commemorate General Soleimani's death. Miscellaneous ransomware attacks. CISA and the FTC brandish, respectively, carrots and sticks.
High technical marks for commercial surveillance software.
Chinese cyberespionage for the Belt and Road Initiative. NSO Group's software used to target US personnel. Microsoft seizes Chinese threat actor's domains.
The still-unformed laws of conflict in cyberspace. Meta reports on adversarial networks. Smishing campaign targets Iranians.
Ransomware operators discuss spending millions of dollars for zero-days.