Investors are still parsing whether this is just another swing in the infamously volatile market, but many individual traders are hurting, badly. Perhaps a few large corporations with ransomware worries will snap up some cryptocurrency now to hedge against future payments.
README adapted this article from a January 2022 report by Matt Goerzen and Gabriella Coleman.
Cybercriminals are selling “exclusive” stolen data to multiple customers, threatening the stability of illicit marketplaces before even considering Justice Department actions.
Welcome to Changelog for 5/8/22, published by Synack! I’m your host, Blake. Last week’s Hack the Capitol event was a hit — I tried my hands at my first-ever Escape Room, hosted by the Department of Homeland Security and designed with input from industrial control system gurus at the Energy Department’s network of national labs.
Most of the code in typical applications comes from open-source projects, importing dozens — and often, hundreds — of components created by volunteers. As the Log4j incident shows, those deep dependencies can carry critical vulnerabilities.
Welcome to Changelog for 5/1/22, published by Synack! Blake here, reporting from Washington, D.C. I’ll be moderating a panel on ransomware threats to critical infrastructure Wednesday at Crowell & Moring LLP here, so say hello if you’ll be attending the fifth edition of the educational “Hack the Capitol” event.
Russian authorities noisily arrested 14 alleged members of the REvil ransomware gang in January after a U.S. government request. So why is the group’s malware and infrastructure suddenly blinking back on?
Welcome to Changelog for 4/24/22, published by Synack! It’s me, Blake, and if you missed the Atlantic Council panel I moderated Friday on the new industrial control system (ICS) focused Pipedream malware, you can check it out here.
T-Mobile is the latest high-profile target of the Lapsus$ cybercriminal group, whose bar-brawl tactics have stoked tech industry fears of copycat attacks