Rapidly Information Technology News
The U.S. water supply systems have become targets of cyberattacks by hackers from China and Iran, raising increasing concern among authorities. As noted by Anne Neuberger, head of cybersecurity at the White House, Iran...
Kaspersky GReAT experts have discovered that the APT group Tropic Trooper intensified its attacks in 2024, targeting government entities in the Middle East. Tropic Trooper, also known as KeyBoy and Pirate Panda, has been...
The Colombian insurance sector has become the target of the hacker group BlindEagle, which, since June 2024, has been actively distributing a modified version of the notorious Quasar RAT malware. Researchers at Zscaler reported...
In July 2024, specialists from Kaspersky Lab discovered that more than ten Russian enterprises across various industries—ranging from engineering to medicine—had fallen victim to cyberattacks involving a previously unknown backdoor, Loki. The malware was...
An unknown cyber group, likely linked to Chinese-speaking hacker collectives, began actively targeting Taiwanese drone manufacturers in 2024. According to Trend Micro, the threat is being tracked under the name TIDRONE, with its primary...
At the end of May, experts from the Natto Team investigated the reconnaissance methods and toolkit of the APT41 hacker group, which is linked to Chinese cyber threats. Continuing their research, the specialists released...
In December of last year, beneath the streets of New York, a unique quantum experiment unfolded. For 15 days, photons of light traveled through an underground network stretching from the Brooklyn Navy Yard to...
Researchers at McAfee have uncovered more than 280 malicious Android applications utilizing optical character recognition (OCR) technology to steal cryptocurrency data. Collectively dubbed SpyAgent, these applications cleverly disguise themselves as official services for banks,...
Scientists from an Israeli university have developed a novel cyberattack technique known as “RAMBO” (Radiation of Air-gapped Memory Bus for Offense). This method enables attackers to transmit data from air-gapped computers via electromagnetic emissions...
An analysis of the threats linked to the Konni campaign reveals increasing activity by the Kimsuky group, employing a variety of methods for conducting stealthy attacks. The danger lies in their use of legitimate...
Experts have identified two types of files associated with the core component of the Akira ransomware: a smaller file (573 KiB) and a larger one (1.005 KiB). Both files are compiled using MSVC and...
The Lazarus Group continues to aggressively advance its cyber offensive campaign in 2024, employing increasingly sophisticated methods. As part of the “Contagious Interview” operation, the attackers pose as recruiters conducting interviews, embedding malware into...