Uncategorized

Leaked ransomware documents show Conti helping Putin from the shadows

Enlarge (credit: Wired | Getty Images) For years, Russia’s cybercrime groups have acted with relative impunity. The Kremlin and local law enforcement have largely turned a blind eye to disruptive ransomware attacks as…

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus

Enlarge (credit: Getty Images) A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that…

Nvidia wants to speed up data transfer by connecting data center GPUs to SSDs 

Enlarge (credit: Getty Images) Microsoft brought DirectStorage to Windows PCs this week. The API promises faster load times and more detailed graphics by letting game developers make apps that load graphical data from the…

Netflix fights password-sharing with test of $3 “Extra Member” fee

Enlarge (credit: Getty Images | cyano66) Netflix will soon charge an extra fee for sharing accounts with people in other households. This is the company's latest attempt to reduce the password-sharing that has…

Trickbot is using MikroTik routers to ply its trade. Now we know why

Enlarge (credit: Getty Images) For years, malicious hackers have been hacking large fleets of MikroTik routers and conscripting them into Trickbot, one of the Internet’s most destructive botnets. Now, Microsoft has finally figured…

Scammers have 2 clever new ways to install malicious apps on iOS devices

Enlarge (credit: Getty Images) Scammers pushing iOS malware are stepping up their game by abusing two legitimate Apple features to bypass App Store vetting requirements and trick people into installing malicious apps. Apple…

Microsoft announces progress on a completely new type of qubit

Enlarge / Microsoft says it sees two clear peaks at the ends of a wire, with a nice energy separation between those and any other energy states. (credit: Microsoft) So far, two primary…

Banks on alert for Russian reprisal cyberattacks on Swift

Enlarge (credit: NurPhoto | Getty Images) Big banks fear that Swift faces a growing threat of Russian cyberattacks after seven of the country’s lenders were kicked off the global payments messaging system over…

Researcher uses Dirty Pipe exploit to fully root a Pixel 6 Pro and Samsung S22

Enlarge (credit: Getty Images) A researcher has successfully used the critical Dirty Pipe vulnerability in Linux to fully root two models of Android phones—a Pixel 6 Pro and Samsung S22—in a hack that…

Researcher uses 379-year-old algorithm to crack crypto keys found in the wild

Enlarge (credit: Getty Images) Cryptographic keys generated with older software now owned by technology company Rambus are weak enough to be broken instantly using commodity hardware, a researcher reported on Monday. This revelation…