North Korean hackers evolve their techniques by mixing malware from previous campaigns
In the new campaign, the hackers have been “mixing and matching” elements of the RustBucket and KandyKorn attacks.
In the new campaign, the hackers have been “mixing and matching” elements of the RustBucket and KandyKorn attacks.
Ardent Health, a hospital operator overseeing 30 medical facilities across the United States, was hit with ransomware.
The company said that all power generation operations remained unaffected.
The group targeted large corporations deploying LockerGoga, MegaCortex, HIVE, and Dharma ransomware.
The threat actors lurked in the company’s networks for over two years.
Media reports indicate that between 80 and 200 law firms may have fallen victim to the attack.
The hackers gained access to the Katyusha monitoring and analytics system used by the Russian Ministry of Defence.
The threat actors used the zero-day flaw to gain initial access to corporate networks.
The world in brief: Researchers found a way to bypass Windows Hello fingerprint authentication, a new North Korean supply chain attack discovered, and more.
The researchers are keeping the technical details of two zero-days under wraps until vendors release security patches.
Showing elements 1631 - 1640