Ukrainian hacker gets prison for infostealer operations
Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS)......»»
How one state"s repeal of a prison "pay-to-stay" law could guide national reform
Nearly every state requires incarcerated individuals to pay for room, board and basic services under so-called "pay-to-stay" laws. In 2019, Illinois became one of the first to repeal such a law—a move that prompted Brittany Friedman, assistant prof.....»»
Why Vanuatu should brace for even more aftershocks after this week"s deadly quakes: A seismologist explains
The death toll from Vanuatu's earthquake disaster continues to rise, with international search and rescue operations underway to help people hit by the initial quake and its aftershocks......»»
Research reveals mental health"s impact on parole rearrest likelihood
Individuals who have a mental illness are more likely to be rearrested after being released from prison than those without a mental illness, according to a new study by a University at Buffalo School of Social Work researcher......»»
Fake CAPTCHA pages used to spread infostealer malware
BeMob and Monetag are being spread by campaign called DeceptionAds......»»
Malvertising on steroids serves Lumma infostealer
A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the users.....»»
3 underrated shows on Netflix you need to watch in December 2024
Here are three underrated shows on Netflix you need to watch in December, including an airplane mystery and an invigorating thriller about a prison break......»»
Don’t use crypto to cheat on taxes: Bitcoin bro gets 2 years
Early bitcoin investor first to get prison time for crypto-related tax evasion. A bitcoin investor who went to increasingly great lengths to hide $1 million in cryptocurrency gain.....»»
We must adjust expectations for the CISO role
Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely int.....»»
NASA scientific balloon flights to lift off from Antarctica
NASA's Scientific Balloon Program has returned to Antarctica's icy expanse to kick off the annual Antarctic Long-Duration Balloon Campaign, where two balloon flights will carry a total of nine missions to near space. Launch operations will begin mid-.....»»
It looks like the end of the road for Cruise robotaxis
Autonomous-driving operations at Cruise look certain to end after its main backer, General Motors, said it will stop funding the initiative......»»
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from D.....»»
Netography introduces AI-powered ransomware detection capabilities
Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion customers t.....»»
Russian court sentences kingpin of Hydra drug marketplace to life in prison
The underground marketplace distributed more than a metric ton of narcotics. A Russian court has issued a life sentence to a man found guilty of being the kingpin of a dark web dr.....»»
Research offers insights into Permian Basin earthquake hazards
A new collection of published papers offers the most detailed and comprehensive breakdown yet of how water injected into the Permian Basin during oil and gas operations is changing subsurface pressures and causing earthquakes......»»
Using DNA to identify seabird bycatch
Australian Antarctic Program scientists have used DNA technology to help identify threatened albatross, petrel and shearwater species caught unintentionally (as 'bycatch') during longline fishing operations in Australian waters......»»
Instagram and TikTok used to recruit money mules; risk prison and bank account ban
A law enforcement agency has said that both Instagram and TikTok are increasingly being used to recruit money mules, who are either knowingly or unknowingly helping criminal gangs to launder money. Those caught face prison sentences of up to 14 ye.....»»
Practical strategies to build an inclusive culture in cybersecurity
In this Help Net Security interview, Alona Geckler, Chief of Staff, SVP of Business Operations at Acronis, shares her insights on the diversity environment in the cybersecurity and IT industries. She discusses the progress made over the past two deca.....»»
Ukrainian cyberwar experience becomes blueprint for TRYZUB cyber training service
The Computer Emergency Response Team of Ukraine (CERT-UA), part of the State Service of Special Communications and Information Protection (SSSCIP), has joined forces with the simulation training platform Cyber Ranges to unveil TRYZUB, a cyber resilie.....»»
Space tech giant Maxar confirms attackers accessed employee data
Satellite and space technology leader Maxar Space Systems has suffered a data breach. “Our information security team discovered that a hacker using a Hong Kong-based IP address targeted and accessed a Maxar system containing certain files with.....»»
Red Hat Enterprise Linux 9.5 helps organizations simplify operations
Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across hybrid.....»»