Free Hacking Packages Now Available to Anyone

Hacking has never been easier. No longer do you need to learn your skills from the ground up. Now, there are several ways into this occupation that require little, if any, effort. For a fee, you can join a hacking group and take money from their successful exploits. This angle is especially popular in the … Continue reading Free Hacking Packages Now Available to Anyone

U.S. Retaliation Against Russian Cyber Attacks

It just may be that the recent Russian cyber attacks against the U.S. were not as unprovoked as it may have seemed. According to a recent report released by Russia's  Rostelecom-Solar, a national cybersecurity technology provider, together with the NCCCI (National Coordination Center for Computer Incidents), a major attack on Russian federal agencies by a … Continue reading U.S. Retaliation Against Russian Cyber Attacks

Malware and Video: The YouTube Connection

Watching online videos is addictive. No, really, there are people who have gone to rehab to get over their video watching addiction. Such people lose sleep, friends, family, and even jobs because video watching is more important than all of these. Experts claim that it is similar to gambling addiction and it can happen to … Continue reading Malware and Video: The YouTube Connection

The IRS is Coming for Your Bitcoin Wallet

When you buy a cryptocurrency, like Bitcoin, you need to put it somewhere. Since a Bitcoin is only computer code, you must store it digitally. You need a digital wallet. Just like any digital software, you can connect your wallet to the internet or use it offline. Wallets connected to the internet are termed 'hot … Continue reading The IRS is Coming for Your Bitcoin Wallet

D.C. Police Hackers Announce a New Model

You may have heard that the ransomware group that took down the Colonial Pipeline were, themselves, hacked. Although that sounds like poetic justice, I wouldn't begin partying just yet. True, the DarkSide ransomware group announced, on a deep web forum, that they lost control of their servers and lost all of their money. Well, maybe. … Continue reading D.C. Police Hackers Announce a New Model

D-Day for D.C.: Russian Hackers Begin Dumping Data from Washington D.C. Police Hack

Sometime before April 27th, the Babuk Locker ransomware gang claimed to have infiltrated the Washington D.C. Metropolitan Police network and stolen 250GB of data. They claim to have found a zero-day vulnerability in the department's VPN. The attack does not appear to rely on file encryption but on pure extortion: Pay us or we release … Continue reading D-Day for D.C.: Russian Hackers Begin Dumping Data from Washington D.C. Police Hack

Russian DarkSide Ransomware Shuts Down Biggest Gas Pipeline in the U.S. (update)

The DarkSide ransomware group is usually classified as an Eastern European hacking group. This is done on the basis of the attackers stopping any attack if certain Eastern European languages are detected on the targeted device. Generally, these languages are Russian, Kazakh, Ukrainian, and Belarusian. However, the most recent version of their malware seems to … Continue reading Russian DarkSide Ransomware Shuts Down Biggest Gas Pipeline in the U.S. (update)

The Forex Catfish Scam

"It was beauty killed the beast." King Kong, 1933 You can't scam someone who doesn't trust you. This is why scammers use every trick possible to make themselves seem legitimate and to earn your trust. They also realize that reason can be circumvented by emotion. Greed, curiosity, and the possibility of romance often overcome common … Continue reading The Forex Catfish Scam

Anyone Want Some North Korean Cybersecurity Protection?

North Korea needs money. They are not the economic powerhouse they had tried to be. In fact, the Dear Leader admitted in January that the economy was a total failure, despite posters showing the contrary. Other nation-states may hack primarily for information, but North Korea hacks primarily for money. The North Koreans may be short … Continue reading Anyone Want Some North Korean Cybersecurity Protection?

University of California, University of Colorado, University of Maryland, Stanford, University of Miami, and Others Snared in Extortion Attacks

It's becoming a common story. Experienced hacking groups use vulnerabilities in widely used third-party software to gain entrance to an enterprise's network. In the most recent case, the Clop ransomware gang leveraged a zero-day vulnerability in a widely used file transfer program from Accellion to penetrate university networks, as well as a number of other … Continue reading University of California, University of Colorado, University of Maryland, Stanford, University of Miami, and Others Snared in Extortion Attacks