Bybit, one of the leading cryptocurrency exchanges, detected unauthorized activity within one of its ETH cold wallets. The malicious actor successfully gained control of the affected cold wallet and transferred its holdings to an unidentified address. This Bybit cyberattack has targeted many crypto communities, but show more ...
the exchange has been quick to respond, ensuring user funds and the overall platform’s security remain intact. The cyberattack on Bybit targeted its Ethereum (ETH) multisig cold wallet. The incident began when a legitimate transfer to the platform’s warm wallet was manipulated. The attacker altered the underlying smart contract logic, while keeping the signing interface seemingly unchanged, masking the real intent behind the transaction. This allowed the attacker to take control of the wallet and transfer the assets—amounting to a large amount of ETH—to a fraudulent address. Response to the Bybit Cyberattack In response to this breach, Bybit’s security team partnered with leading blockchain forensic experts and partners to investigate the attack. The platform is actively working with any team with blockchain analytics expertise and fund recovery capabilities to trace and possibly recover the stolen assets. [caption id="attachment_101021" align="alignnone" width="654"] Bybit Cyberattack Details (Source: Bybit)[/caption] The company has been transparent in sharing updates with its users and partners, assuring them that their funds are safe and that the breach did not affect other cold wallets. “We want to assure our users and partners that all other Bybit cold wallets remain fully secure. All client funds are safe, and our operations continue as usual without any disruption,” a statement from the company read. Collaboration and Quick Response The quick response from Bybit, along with its partners in the crypto community, played a critical role in mitigating the damage caused by the Bybit cyberattack. Bybit’s efforts were supported by multiple organizations, including Tether, THORChain, ChangeNOW, FixedFloat, and CoinEx, among others. These teams acted quickly to freeze and block the stolen assets, limiting the attacker’s ability to move the funds further. In a single day, $42.89 million was successfully frozen, marking a key victory in the battle against cybercrime in the crypto space. The mETH Protocol team also played a crucial role in the recovery process. Through their prompt actions, they successfully retrieved 15,000 cmETH tokens, valued at around $43 million, which were subsequently returned to Bybit. This operation was pivotal in demonstrating the power of collaboration in fighting cyberattacks in the crypto world. Ben Zhou, the CEO of Bybit, also provided regular updates on the progress of recovery, including reassuring the public that Bybit was working to close the gap caused by the breach. "Bybit has already fully closed the ETH gap, and a new audited Proof of Reserves (POR) report will be published very soon to show that Bybit is again back to 100% 1:1 on client assets," he shared in a tweet, noting that Bybit had received a total of 446,870 ETH, worth $1.23 billion, through loans and deposits to bolster its reserves. Transparency and Security Despite the severity of the incident, Bybit has emerged resilient. The platform’s response to the data breach at Bybit has been quick and transparent. Within hours of the attack, Bybit processed over 350,000 withdrawal requests and completed 99.9% of them by 1:45 AM UTC. In total, the exchange processed over 580,000 successful withdrawal requests. The company’s security team worked relentlessly to restore all services, and by February 22, 2025, Bybit’s deposit and withdrawal activity had returned to pre-incident levels. Total deposits slightly exceeded withdrawals, further indicating the market’s confidence in Bybit’s operations. Additionally, Bybit observed a surge in crypto asset deposits worth approximately $1.5 billion, reinforcing the platform’s reliability. Although the incident led to a temporary spike in trading volumes, which saw users reallocating assets, the market has since stabilized. Bybit’s trading environment is now back to normal, with no unusual liquidations or sell-offs being reported. Continuous Improvement in Security Measures As part of its ongoing commitment to user security, Bybit has reassured its community that the platform is working to strengthen its security infrastructure. The exchange has promised to implement further measures to prevent future incidents and upgrade trust levels in its platform. Bybit’s approach to handling the cyberattack also highlights the importance of collaboration within the crypto community. Throughout the crisis, the platform received support from industry peers and partners, with many offering assistance in freezing the attacker’s stolen assets and blocking blacklisted addresses. This kind of teamwork has been instrumental in preventing the cyberattack from spiraling into a larger-scale disaster for the platform and its users. In addition to restoring its systems, Bybit has committed to publishing an audited Proof of Reserves report to demonstrate the complete recovery of its ETH reserves, offering users further transparency into the platform’s operations. Bybit has also urged users to stay vigilant and protect themselves against scams, reminding them that Bybit will never ask for personal information, deposits, or passwords. With strong support from both users and partners, Bybit’s prompt actions have limited the attack's damage and reinforced the importance of collaboration within the crypto community.
We live in the age of AI hype. Artificial intelligence is here, there, and everywhere – so promising, slightly mysterious, but undeniably guiding humanity toward a brighter future of technological singularity thats still somewhat incomprehensible and potentially a black hole. Some readers might detect sarcasm in show more ...
this statement – but that would be a mistake. Machine learning-driven automation (ML), neural networks, and other AI technologies have already taken over many industries. And theres more to come in the evolution of Homo sapiens. If youre interested in diving deeper into this topic, check out the history of the various industrial revolutions: first, second, third, and even fourth. In line with this trend, cybersecurity was perhaps one of the pioneers in adopting new, smart technologies. And what makes me particularly proud of this process is that our company was one of the first in the industry to successfully implement this bright AI-driven future. How else could we possibly handle nearly half a million new malicious programs emerging every single day as of early 2025? No educational system in the world can produce enough experts to keep up with that. The only solution is to create intelligent systems capable of independently and highly accurately neutralizing cyberattacks. Experts are then left with only the most complex cases – and, of course, the challenging task of inventing and continuously improving these systems. A few days ago, we celebrated an exciting anniversary. Twenty years ago was born the prototype of our first AI/ML technology for automatic malware analysis and the creation of detections – antivirus updates that protect computers, gadgets, and other devices from new attacks. The technology was given a name thats rather odd at first glance – Avtodyatel, which translates as Auto-Woodpecker! But theres a simple explanation for it: within our team, security analysts were affectionately referred to as woodpeckers – tirelessly pecking away at viruses and processing streams of suspicious files. And then we added the Auto to Woodpecker for the name of the tech designed to do this job automatically (incidentally, I was a woodpecker myself back then). After digging through our archives, we found not only the birthdate of this first automation baby, but also some fascinating photos of the original plans for its creation. We even recalled its birthplace – the 14th floor of the Radiophysics building near the Planernaya metro station in northwest Moscow where we rented office space at the time. So get comfy, and Ill tell you a fascinating story. It all started kinda like this A quarter of a century ago, malicious programs were much rarer – and, paradoxically, much more advanced – than todays typical malware, despite being written by pioneering enthusiasts, inventive lone programmers, and cyber pranksters. This made researching them a real pleasure – each new virus taught you something new. Back then, like my fellow woodpeckers, I manually analyzed the stream of malicious programs – what would now be called malware research. By that time, it was already difficult to compile all existing malware into a single reference book as had been done back in 1992. But we still managed the flow, and at the end of each work week, I manually compiled antivirus database updates. However, over time, malware creation evolved from mere mischief and boundary-pushing into a full-fledged criminal industry. Cybercriminals no longer just wanted to infect as many computers as possible – they sought to profit from it. For example, they harvested email addresses from infected machines and sold them for spam distribution. Sensing profit, these bad actors triggered exponential growth in malware production. But instead of inventing fundamentally new threats, they started mass-producing slightly modified versions of existing ones. And I realized we couldnt keep up manually; if we were to continue down this path, wed drown in an endless flood of cyber-garbage. Fortunately, technological advancements at the time required much smaller investment and less development time. You could just buy some pizza (pineapple-topped, of course!), gather a few brilliant minds in a meeting room, and spend a couple of hours brainstorming project ideas. And so, on February 22, 2005, I assembled my colleagues to develop plans for automating our malware analyst work. Just take a look at this beauty! We had some primitive automation tools before, of course. But Auto-Woodpecker was the first system with a fundamentally new level: It freed up valuable experts from repetitive tasks, allowing them to focus on more advanced challenges. It massively scaled up operational efficiency. It helped highlight similar (or related) incidents for further analysis. In simple terms, the system automatically received new files from agents (crawlers) that scanned websites, email traps, and network sensors. These files were then automatically unpacked and executed in a secure environment – an artificial setting designed to observe malware behaviour. There, the samples were analyzed by automated scanners, classified, and then compiled into antivirus databases. The key challenge when encountering a new malware sample was determining whether it was a never-before-seen threat, or simply a variation of a known one. This is where the file auto-classifier (marked as FF in the diagram above) came into play, utilizing AI/ML principles – now an essential feature in nearly every cybersecurity product (except for fraudulent ones). It didnt work perfectly at first, but it quickly improved. We systematically documented all our ideas, detailed how subsystems would interact, how data would be exchanged, and how false positives would be handled. Then we rolled up our sleeves and got to work. A few months later, the first version of Auto-Woopecker went live. The results were instant and dramatic. Previously, five of us manually analyzed around 300 malware samples per week – an impressive number at the time. But with Auto-Woodpecker our productivity skyrocketed. And as the technology improved, this skyrocketing just kept on… skyrocketing! Before long, Auto-Woodpecker was processing the entire incoming stream – leaving only 2-5% of all suspicious files for manual expert review. Today, of course, our tools are far more advanced, and AI-driven technologies play an even bigger role in cybersecurity. To give you a glimpse of how far weve come, here are just a few recent examples: Kaspersky MLAD (Machine Learning for Anomaly Detection): A predictive analytics system that detects early signs of equipment failure, process disruptions, cyberattacks, and human errors in industrial telemetry signals – long before they cause real damage. Kaspersky MDR (Managed Detection and Response) This service has been using an AI analyst for several years to filter out false positives, reducing the workload on SOC specialists and allowing them to focus on complex threat investigations. Kaspersky Threat Lookup: Just last week we integrated a tool for finding contextual information on indicators of compromise using an AI-powered large language model. The results speak for themselves, and we have even bigger plans ahead! Happy 20th Anniversary, Auto-Woodpecker!! Cin cin!
One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray. At the same time, agencies are battling an ongoing effort by the show more ...
world’s richest man to wrest control over their networks and data. Image: Shutterstock. Greg Meland. The Trump administration has fired at least 130 employees at the federal government’s foremost cybersecurity body — the Cybersecurity and Infrastructure Security Agency (CISA). Those dismissals reportedly included CISA staff dedicated to securing U.S. elections, and fighting misinformation and foreign influence operations. Earlier this week, technologists with Elon Musk’s Department of Government Efficiency (DOGE) arrived at CISA and gained access to the agency’s email and networked files. Those DOGE staffers include Edward “Big Balls” Coristine, a 19-year-old former denizen of the “Com,” an archipelago of Discord and Telegram chat channels that function as a kind of distributed cybercriminal social network. The investigative journalist Jacob Silverman writes that Coristine is the grandson of Valery Martynov, a KGB double agent who spied for the United States. Silverman recounted how Martynov’s wife Natalya Martynova moved to the United States with her two children after her husband’s death. “Her son became a Virginia police officer who sometimes posts comments on blogs about his historically famous father,” Silverman wrote. “Her daughter became a financial professional who married Charles Coristine, the proprietor of LesserEvil, a snack company. Among their children is a 19-year-old young man named Edward Coristine, who currently wields an unknown amount of power and authority over the inner-workings of our federal government.” Another member of DOGE is Christopher Stanley, formerly senior director for security engineering at X and principal security engineer at Musk’s SpaceX. Stanley, 33, had a brush with celebrity on Twitter in 2015 when he leaked the user database for the DDoS-for-hire service LizardStresser, and soon faced threats of physical violence against his family. My 2015 story on that leak did not name Stanley, but he exposed himself as the source by posting a video about it on his Youtube channel. A review of domain names registered by Stanley shows he went by the nickname “enKrypt,” and was the former owner of a pirated software and hacking forum called error33[.]net, as well as theC0re, a video game cheating community. “A NATIONAL CYBERATTACK” DOGE has been steadily gaining sensitive network access to federal agencies that hold a staggering amount of personal and financial information on Americans, including the Social Security Administration (SSA), the Department of Homeland Security, the Office of Personnel Management (OPM), and the Treasury Department. Most recently, DOGE has sought broad access to systems at the Internal Revenue Service that contain the personal tax information on millions of Americans, including how much individuals earn and owe, property information, and even details related to child custody agreements. The New York Times reported Friday that the IRS had reached an agreement whereby a single DOGE employee — 25-year-old Gavin Kliger — will be allowed to see only anonymized taxpayer information. The rapidity with which DOGE has rifled through one federal database after another in the name of unearthing “massive fraud” by government agencies has alarmed many security experts, who warned that DOGE’s actions bypassed essential safeguards and security measures. “The most alarming aspect isn’t just the access being granted,” wrote Bruce Schneier and Davi Ottenheimer, referring to DOGE as a national cyberattack. “It’s the systematic dismantling of security measures that would detect and prevent misuse—including standard incident response protocols, auditing, and change-tracking mechanisms—by removing the career officials in charge of those security measures and replacing them with inexperienced operators.” Jacob Williams is a former hacker with the U.S. National Security Agency who now works as managing director of the cybersecurity firm Hunter Labs. Williams kicked a virtual hornet’s nest last week when he posted on LinkedIn that the network incursions by DOGE were “a bigger threat to U.S. federal government information systems than China.” Williams said while he doesn’t believe anyone at DOGE would intentionally harm the integrity and availability of these systems, it’s widely reported (and not denied) that DOGE introduced code changes into multiple federal IT systems. These code changes, he maintained, are not following the normal process for vetting and review given to federal government IT systems. “For those thinking ‘I’m glad they aren’t following the normal federal government IT processes, those are too burdensome’ I get where you’re coming from,” Williams wrote. “But another name for ‘red tape’ are ‘controls.’ If you’re comfortable bypassing controls for the advancement of your agenda, I have questions – mostly about whether you do this in your day job too. Please tag your employer letting them know your position when you comment that controls aren’t important (doubly so if you work in cybersecurity). All satire aside, if you’re comfortable abandoning controls for expediency, I implore you to decide where the line is that you won’t cross in that regard.” The DOGE website’s “wall of receipts” boasts that Musk and his team have saved the federal government more than $55 billion through staff reductions, lease cancellations and terminated contracts. But a team of reporters at The New York Times found the math that could back up those checks is marred with accounting errors, incorrect assumptions, outdated data and other mistakes. For example, DOGE claimed it saved $8 billion in one contract, when the total amount was actually $8 million, The Times found. “Some contracts the group claims credit for were double- or triple-counted,” reads a Times story with six bylines. “Another initially contained an error that inflated the totals by billions of dollars. While the DOGE team has surely cut some number of billions of dollars, its slapdash accounting adds to a pattern of recklessness by the group, which has recently gained access to sensitive government payment systems.” So far, the DOGE website does not inspire confidence: We learned last week that the doge.gov administrators somehow left their database wide open, allowing someone to publish messages that ridiculed the site’s insecurity. A screenshot of the DOGE website after it was defaced with the message: “These ‘experts’ left their database open – roro” APPOINTMENTS Trump’s efforts to grab federal agencies by their data has seen him replace career civil servants who refused to allow DOGE access to agency networks. CNN reports that Michelle King, acting commissioner of the Social Security Administration for more than 30 years, was shown the door after she denied DOGE access to sensitive information. King was replaced by Leland Dudek, formerly a senior advisor in the SSA’s Office of Program Integrity. This week, Dudek posted a now-deleted message on LinkedIn acknowledging he had been placed on administrative leave for cooperating with DOGE. “I confess,” Dudek wrote. “I bullied agency executives, shared executive contact information, and circumvented the chain of command to connect DOGE with the people who get stuff done. I confess. I asked where the fat was and is in our contracts so we can make the right tough choices.” Dudek’s message on LinkedIn. According to Wired, the National Institute of Standards and Technology (NIST) was also bracing this week for roughly 500 staffers to be fired, which could have serious impacts on NIST’s cybersecurity standards and software vulnerability tracking work. “And cuts last week at the US Digital Service included the cybersecurity lead for the central Veterans Affairs portal, VA.gov, potentially leaving VA systems and data more vulnerable without someone in his role,” Wired’s Andy Greenberg and Lily Hay Newman wrote. NextGov reports that Trump named the Department of Defense’s new chief information security officer: Katie Arrington, a former South Carolina state lawmaker who helped steer Pentagon cybersecurity contracting policy before being put on leave amid accusations that she disclosed classified data from a military intelligence agency. NextGov notes that the National Security Agency suspended her clearance in 2021, although the exact reasons that led to the suspension and her subsequent leave were classified. Arrington argued that the suspension was a politically motivated effort to silence her. Trump also appointed the former chief operating officer of the Republican National Committee as the new head of the Office of National Cyber Director. Sean Cairncross, who has no formal experience in technology or security, will be responsible for coordinating national cybersecurity policy, advising the president on cyber threats, and ensuring a unified federal response to emerging cyber-risks, Politico writes. DarkReading reports that Cairncross would share responsibility for advising the president on cyber matters, along with the director of cyber at the White House National Security Council (NSC) — a group that advises the president on all matters security related, and not just cyber. CONSUMER PROTECTION? The president also ordered staffers at the Consumer Financial Protection Bureau (CFPB) to stop most work. Created by Congress in 2011 to be a clearinghouse of consumer complaints, the CFPB has sued some of the nation’s largest financial institutions for violating consumer protection laws. The CFPB says its actions have put nearly $18 billion back in Americans’ pockets in the form of monetary compensation or canceled debts, and imposed $4 billion in civil money penalties against violators. The CFPB’s homepage has featured a “404: Page not found” error for weeks now. Trump has appointed Russell Vought, the architect of the conservative policy playbook Project 2025, to be the CFPB’s acting director. Vought has publicly favored abolishing the agency, as has Elon Musk, whose efforts to remake X into a payments platform would otherwise be regulated by the CFPB. The New York Times recently published a useful graphic showing all of the government staffing changes, including the firing of several top officials, affecting agencies with federal investigations into or regulatory battles with Musk’s companies. Democrats on the House Judiciary Committee also have released a comprehensive account (PDF) of Musk’s various conflicts of interest. Image: nytimes.com As the Times notes, Musk and his companies have repeatedly failed to comply with federal reporting protocols aimed at protecting state secrets, and these failures have prompted at least three federal reviews. Those include an inquiry launched last year by the Defense Department’s Office of Inspector General. Four days after taking office, Trump fired the DoD inspector general along with 17 other inspectors general. The Trump administration also shifted the enforcement priorities of the U.S. Securities and Exchange Commission (SEC) away from prosecuting misconduct in the cryptocurrency sector, reassigning lawyers and renaming the unit to focus more on “cyber and emerging technologies.” Reuters reports that the former SEC chair Gary Gensler made fighting misconduct in a sector he termed the “wild west” a priority for the agency, targeting not only cryptocurrency fraudsters but also the large firms that facilitate trading such as Coinbase. On Friday, Coinbase said the SEC planned to withdraw its lawsuit against the crypto exchange. Also on Friday, the cryptocurrency exchange Bybit announced on X that a cybersecurity breach led to the theft of more than $1.4 billion worth of cryptocurrencies — making it the largest crypto heist ever. ORGANIZED CRIME AND CORRUPTION On Feb. 10, Trump ordered executive branch agencies to stop enforcing the U.S. Foreign Corrupt Practices Act, which froze foreign bribery investigations, and even allows for “remedial actions” of past enforcement actions deemed “inappropriate.” Trump’s action also disbanded the Kleptocracy Asset Recovery Initiative and KleptoCapture Task Force — units which proved their value in corruption cases and in seizing the assets of sanctioned Russian oligarchs — and diverted resources away from investigating white-collar crime. That’s according to the independent Organized Crime and Corruption Reporting Project (OCCRP), an investigative journalism outlet that until very recently was funded in part by the U.S. Agency for International Development (USAID). The OCCRP lost nearly a third of its funding and was forced to lay off 43 reporters and staff after Trump moved to shutter USAID and freeze its spending. NBC News reports the Trump administration plans to gut the agency and leave fewer than 300 staffers on the job out of the current 8,000 direct hires and contractors. The Global Investigative Journalism Network wrote this week that the sudden hold on USAID foreign assistance funding has frozen an estimated $268 million in agreed grants for independent media and the free flow of information in more than 30 countries — including several under repressive regimes. Elon Musk has called USAID “a criminal organization” without evidence, and promoted fringe theories on his social media platform X that the agency operated without oversight and was rife with fraud. Just months before the election, USAID’s Office of Inspector General announced an investigation into USAID’s oversight of Starlink satellite terminals provided to the government of Ukraine. KrebsOnSecurity this week heard from a trusted source that all outgoing email from USAID now carries a notation of “sensitive but unclassified,” a designation that experts say could make it more difficult for journalists and others to obtain USAID email records under the Freedom of Information Act (FOIA). On Feb. 20, Fedscoop reported also hearing the same thing from multiple sources, noting that the added message cannot be seen by senders until after the email is sent. FIVE BULLETS On Feb. 18, Trump issued an executive order declaring that only the U.S. attorney general and the president can provide authoritative interpretations of the law for the executive branch, and that this authority extends to independent agencies operating under the executive branch. Trump is arguing that Article II, Clause 1 of the Constitution vests this power with the president. However, jurist.org writes that Article II does not expressly state the president or any other person in the executive branch has the power to interpret laws. “The article states that the president is required to ‘take care that the laws be faithfully executed,'” Juris noted. “Jurisdiction to interpret laws and determine constitutionality belongs to the judicial branch under Article III. The framers of the Constitution designed the separation of duties to prevent any single branch of government from becoming too powerful.” The executive order requires all agencies to submit to “performance standards and management objectives” to be established by the White House Office of Management and Budget, and to report periodically to the president. Those performance metrics are already being requested: Employees at multiple federal agencies on Saturday reported receiving an email from the Office of Personnel Management ordering them to reply with a set of bullet points justifying their work for the past week. “Please reply to this email with approx. 5 bullets of what you accomplished last week and cc your manager,” the notice read. “Please do not send any classified information, links, or attachments. Deadline is this Monday at 11:59 p.m. EST.” An email sent by the OPM to more than two million federal employees late in the afternoon EST on Saturday, Feb. 22. In a social media post Saturday, Musk said the directive came at the behest of President Trump, and that failure to respond would be taken as a resignation. Meanwhile, Bloomberg writes the Department of Justice has been urging employees to hold off replying out of concern doing so could trigger ethics violations. The National Treasury Employees Union also is advising its employees not to respond. A legal battle over Trump’s latest executive order is bound to join more than 70 other lawsuits currently underway to halt the administration’s efforts to massively reduce the size of the federal workforce through layoffs, firings and attrition. KING TRUMP? On Feb. 15, the president posted on social media, “He who saves his Country does not violate any Law,” citing a quote often attributed to the French dictator Napoleon Bonaparte. Four days later, Trump referred to himself as “the king” on social media, while the White House nonchalantly posted an illustration of him wearing a crown. Trump has been publicly musing about running for an unconstitutional third-term in office, a statement that some of his supporters dismiss as Trump just trying to rile his liberal critics. However, just days after Trump began his second term, Rep. Andy Ogles (R-Tenn.) introduced a bill to amend the Constitution so that Trump — and any other future president — can be elected to serve a third term. This week at the Conservative Political Action Conference (CPAC), Rep. Ogles reportedly led a group of Trump supporters calling itself the “Third Term Project,” which is trying to gain support for the bill from GOP lawmakers. The event featured images of Trump depicted as Caesar. A banner at the CPAC conference this week in support of The Third Term Project, a group of conservatives trying to gain support for a bill to amend the Constitution and allow Trump to run for a third term. Russia continues to be among the world’s top exporters of cybercrime, narcotics, money laundering, human trafficking, disinformation, war and death, and yet the Trump administration has suddenly broken with the Western world in normalizing relations with Moscow. This week President Trump stunned U.S. allies by repeating Kremlin talking points that Ukraine is somehow responsible for Russia’s invasion, and that Ukrainian President Volodymyr Zelensky is a “dictator.” The president repeated these lies even as his administration is demanding that Zelensky give the United States half of his country’s mineral wealth in exchange for a promise that Russia will cease its territorial aggression there. President Trump’s servility toward an actual dictator — Russian President Vladimir Putin — does not bode well for efforts to improve the cybersecurity of U.S. federal IT networks, or the private sector systems on which the government is largely reliant. In addition, this administration’s baffling moves to alienate, antagonize and sideline our closest allies could make it more difficult for the United States to secure their ongoing cooperation in cybercrime investigations. It’s also startling how closely DOGE’s approach so far hews to tactics typically employed by ransomware gangs: A group of 20-somethings with names like “Big Balls” shows up on a weekend and gains access to your servers, deletes data, locks out key staff, takes your website down, and prevents you from serving customers. When the federal executive starts imitating ransomware playbooks against its own agencies while Congress largely gazes on in either bewilderment or amusement, we’re in four-alarm fire territory. At least in theory, one can negotiate with ransomware purveyors.
This move comes less than a year after the United States banned Kaspersky products, out of the same fear that the company is under Russian government control.
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity.
A new streaming series about a catastrophic, nationwide cyberattack against US critical infrastructure is about as believable as its main character: an honest, bipartisan, universally beloved politician.
Confirmation by South Korea's data protection agency that the AI chatbot sent data to TikTok's Chinese parent company has spurred a ban in that nation, and is again is calling into question DeepSeek's safety.
Cybersecurity researchers say North Korean hackers are behind the largest cryptocurrency heist in history and are actively laundering the more than $1.4 billion in cryptocurrency stolen from the Bybit exchange on Friday.
The latest package of EU sanctions related to Russia's invasion of Ukraine included the leader of the North Korean intelligence agency known for backing the Lazarus group and other high-profile hacking operations.
An AI-generated video of the president and the DOGE leader greeted Department of Housing and Urban Development workers as they entered headquarters in the morning. As of midday, no one had taken credit for the prank.
Kaspersky software "poses an unacceptable security risk to the Australian government, networks, and data,” Home Affairs Secretary Stephanie Foster said in announcing a ban on the cybersecurity company's products.
Researchers say a large botnet-driven campaign poses a threat to Microsoft 365 environments that still use an authentication process that the tech giant has been phasing out in recent years.
Australia has become the latest country to ban the installation of security software from Russian company Kaspersky, citing national security concerns. "After considering threat and risk analysis, I have determined that the use of Kaspersky Lab, Inc. products and web services by Australian Government entities poses an unacceptable security risk to Australian Government, networks and data,
Welcome to your weekly roundup of cyber news, where every headline gives you a peek into the world of online battles. This week, we look at a huge crypto theft, reveal some sneaky AI scam tricks, and discuss big changes in data protection. Let these stories spark your interest and help you understand the changing threats in our digital world. ⚡ Threat of the Week Lazarus Group Linked to
Ransomware doesn’t hit all at once—it slowly floods your defenses in stages. Like a ship subsumed with water, the attack starts quietly, below the surface, with subtle warning signs that are easy to miss. By the time encryption starts, it’s too late to stop the flood. Each stage of a ransomware attack offers a small window to detect and stop the threat before it’s too late. The problem is
Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat posed by cryptographically-relevant quantum computers. The feature, currently in preview, coexists with the National Institute of Standards and Technology's (NIST) post-quantum cryptography (PQC)
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025. A notable aspect of the stealer malware is the use of a technique called dead drop
A serious security vulnerability has been found in popular stalkerware apps, exposing the sensitive personal information and communications of millions of people. Read more in my article on the Hot for Security blog.
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
Learn more about the impact of Amateur Radio and Digital Communications Foundation’s support of SWE scholarships, including testimonials from scholarship recipients. Source Views: 0 La entrada The Impact of the ARDC Foundation’s Scholarships for Women in Engineering se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
As part of the Asian Connections Affinity Group’s spotlight month, four of their members reflect on their experiences in a global organization. Source Views: 0 La entrada Asian Connections Affinity Group: The AAPI Experience in a Global Company se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Praveen Gujar reflects on being an ally to his wife and shares four tips to foster an inclusive culture in the professional environment. Source Views: 0 La entrada Allyship Begins at Home: A Personal Journey to Workplace Inclusivity se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Vidhya Thiyagarajan shares about her SWE collegiate experience and reflects on what it was like to start a SWENext Club at her high school in this episode of Diverse: a SWE podcast. Source Views: 0 La entrada SWE Diverse Podcast Ep 260: The SWE Collegiate Experience With Vidhya Thiyagarajan se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Discover several popular leadership assessments for engineers and learn how assessments are used in SWE’s eXXec program for mid- and late-career engineering professionals. Source Views: 0 La entrada The Best Leadership Assessments for Engineers se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
The Society of Women Engineers (SWE) has conducted this annual research summary for 20 years. Source Views: 0 La entrada SWE Magazine Publishes 2023 Engineering Literature Review se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Take just 10 minutes and complete the global Gender Scan survey on gender equity in STEM today! Source Views: 0 La entrada Why Aren’t More Women in STEM? Help Us Discover the Answer se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Sriram Panyam reflects on allyship and how to build a more inclusive landscape for women in engineering and technology. Source Views: 0 La entrada Championing Women in Tech: A Call to Action for Engineering Leaders se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just show more ...
performed triggered the security solution. There are several […] La entrada Thailand Targets Cyber Sweatshops to Free 1,000s of Captives – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Marc Handelman Sunday, February 23, 2025 Home » Security Bloggers Network » DEF CON 32 – Efficient Bug Bounty Automation Techniques Author/Presenter: Gunnar Andrews Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 show more ...
content. Originating from the conference’s events located at the Las Vegas […] La entrada DEF CON 32 – Efficient Bug Bounty Automation Techniques – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.