Tag: EN

Silk Typhoon Hacker Extradited to U.S. from Italy

Chinese authorities-linked hacker Xu Zewei, accused of playing a central role in the notorious Silk Typhoon (HAFNIUM) cyber campaign, has been extradited from Italy to the United States, marking a significant development in ongoing efforts to combat state-sponsored cyber espionage.…

VECT Ransomware: Why Paying Won’t Get Your Files Back

Do not pay the ransom. VECT permanently destroys large files rather than locking them. Even the attackers cannot recover them. Payment will not restore your data  VECT partnered with TeamPCP and BreachForums to build one of the largest ransomware affiliate networks ever assembled, giving them a ready-made…

Chinese Engineer Stole US Military Software

A Chinese aerospace engineer, Song Wu, has been implicated in a significant case of international espionage involving the theft of sensitive US military software. This article has been indexed from CyberMaterial Read the original article: Chinese Engineer Stole US Military…

DORA and Operational Resilience

The Digital Operational Resilience Act (DORA) is a regulatory framework introduced by the European Union to enhance the resilience of financial services firms against IT disruptions. This article has been indexed from CyberMaterial Read the original article: DORA and Operational…

Cybersecurity Professionals Feel Undervalued

A new report by Harvey Nash highlights a growing sense of dissatisfaction among cybersecurity professionals, with over three-quarters not receiving a pay raise last year. This article has been indexed from CyberMaterial Read the original article: Cybersecurity Professionals Feel Undervalued

Cyber Resilience as Capital Planning: Quantifying Risk

For decades, the cybersecurity budgethas been treated as part of Operational Expenditure (OpEx), a necessary “tax” on doing business, much like insurance or electricity. Security leaders have traditionally fought for budgets based on fear, uncertainty, and doubt, often struggling to…

Fake CAPTCHA scam leads to costly phone bills

A recent investigation by researchers has revealed a deceptive campaign that exploits fake CAPTCHA pages to trick mobile users into incurring hefty international SMS charges. This article has been indexed from CyberMaterial Read the original article: Fake CAPTCHA scam leads…

Sandworm Uses SSH-over-Tor Tunnel

Sandworm, a state-sponsored threat group also known as FROZENBARENTS, has adopted a new technique involving SSH-over-Tor tunneling to maintain long-term, covert access to targeted networks. This article has been indexed from CyberMaterial Read the original article: Sandworm Uses SSH-over-Tor Tunnel