UK police tried DDoS style attacks to disrupt service on suspected drug dealer's phones in cases where they couldn't prosecute but were looking to interfere with the drug trade.
The hospitality industry has become an unlikely front line in the cyber-security battle, as a combination of desirable personal data, high-net worth individuals and complex network topography has seen attacks rise significantly.
Amid reports of Russian hackers influencing elections, Chinese hackers pilfering state secrets, and North Korea launching ransomware attacks, it would be easy to underestimate Iran's potential as a cyber-threat to the US.
DDoS threat actors have started to exploit a known problem with unsecured Memcache servers to launch hugely powerful attacks with little in the way of resource investment required.
UK councils are suffering from a lack of training in the face of a vast number of cyber attacks, averaging 37 attacks per minute, according to a new report.
The UK government publicly accused Russia of carrying out the June 2017 NotPetya ransomware attacks in June 2017 as part of a deliberate attack on the Ukraine state.
Attackers were found exploiting a zero-day Telegram app vulnerability in order to make the names and extensions of malicious files appear more legitimate, in hopes that users who received these files would more willingly open them.
While the use of HTTPS encryption is on the rise, the same is unfortunately true of attackers using it to mask their operations, according to a new report.
Hackers are increasingly turning to server-side attacks, according to a new report. Report notes fall in use of client-side exploit kits.
An Indicator of Compromise is typically observed after an initial attack or compromise, whereas Indicators of attack (IOAs) are events that may reveal an active attack before IOCs become visible.
The Software Engineering Institute at Carnegie Mellon University (KB CERT) posted an advisory warning stating the Pulse Secure VPN Linux graphic user interface (GUI) fails to validate SSL certificates.
96 percent of organisations were targeted by Business Email Compromise (BEC) attacks in the second half of 2017, primarily because such attacks did not include malicious payloads or attachments.
Most ransomware victims hit more than once, and don't have defences. Industry adopting AI that deploys deep learning neural network machine learning is predictive by looking for and identifying the techniques scammers use.
A wave of attacks leveraging the popular third-party services Google+, Pastebin, and bit.ly is targeting individuals and organisations within the Palestinian Territories.
Shipping giant and NotPetya victim Maersk was forced to replace tens of thousands of servers and computers in the aftermath of the 17 June ransomware attack, the company's charman said in Davos at the World Economic Forum.
While ransomware attacks on consumers and businesses slowed down towards the fag end of 2017, they were replaced by spyware campaigns which rose by over 800 percent year-on-year.
Attackers continue to consider email an attractive attack vector and this highlights the stresses that security pros face daily trying to sort through threats.
Attackers have made off with up to US$ 400,000 (£290,000) in cryptocurrency after an ingenious attack on Stellar Lumen (XLM) wallet, BlackWallet.
Cisco Talos researchers identified multiple unpatched vulnerabilities in the Blender Open Source 3D creation suite that could allow an attacker to run arbitrary code.
Vulnerabilities in the group communication protocols of three encrypted messaging apps - WhatsApp, Signal, and Threema - could allow attackers to willfully subvert their integrity and confidentiality.
A North Korean cryptominer is raising questions as to whether it is an educational tool or a prototype to carry out silent attacks on unsuspecting CPUs.
The Necurs botnet continued to launch massive global ransomware attacks through the holidays with researchers stopping as many as 47 million emails per day.
Cyber-criminals are spoofing scanners by the millions to launch attacks containing malicious attachments that appear to be coming from the network printer.
For every business opportunity that our hyper-connected world is creating, that same hyper-connectivity creates criminal opportunity for cyber-attackers.
Happy New Year! SC Media UK resumes news reporting on 2 Jan 2018. During the break, catch up on our experts' predictions for a range of positive and negative futures, from the impacts of AI to likely new Zero days.
Several multistage attacks that use cryptocurrency-related lures to infect victims with backdoors and reconnaissance malware that have been attributed to the Lazarus Group have been uncovered by Proofpoint researchers.
Security researchers have discovered a new attack vector launched through Microsoft Excel spreadsheets, and the Loki Bot has just recently expanded into other Office applications.
It's essential that IT teams complete patching, updates and changes to their networks before high volume traffic times hit so they can focus on responding quickly to network events and security issues says James Barrett.
Attackers exploited an old WordPress vulnerability to infect more than one thousand websites with malware capable of injecting malvertising and even creating a rogue admin user with full access privileges, according to researchers.
Anti-Israeli factions of the Anonymous collective opposed to US Foreign policy declared that they would be launching attacks against all websites deemed to be Israeli- or US-government affiliated in their latest #OpIsrael campaign.