Headlines

Morgan Sarah

Hi, I'm Sarah Morgan, an investigative journalist focusing on counterterrorism and intelligence. I'm driven by the belief that understanding the root causes of terrorism and addressing security gaps can contribute to a safer society.

North Korean Hackers Suspected in Major Data Breach at Seoul Hospitalcybersecurity,databreach,NorthKorea,hacking,SeoulHospital

North Korean Hackers Suspected in Major Data Breach at Seoul Hospital

# In-Depth Report: North Korean Hackers Responsible for Cyberattack on South Korean Hospital Seoul National University Hospital, one of South Korea’s largest hospitals, suffered a major cyberattack between May and June 2021, resulting in data exposure for about 831,000 people, mostly patients, according to a recent report released by the Korean National Police Agency (KNPA)….

Read More
Mandiant CEO claims China has redefined its approach to cyberattackscybersecurity,China,Mandiant,cyberattacks,approach

Mandiant CEO claims China has redefined its approach to cyberattacks

Chinese Cyber Espionage Group UNC3886’s Stealthy Attack on Fortinet Firewalls A stealthy and sophisticated cyber-espionage attack on a defense industry organization in 2022 has been attributed to Chinese hacking group UNC3886, according to Mandiant CEO, Kevin Mandia. The attackers managed to gain administrator privileges in the Fortinet FortiGate firewalls and set up a virtual API…

Read More
How Privoro and Samsung's Partnership is Ensuring Secure Control of Smartphone Radios and SensorsPrivoro,Samsung,Partnership,Smartphone,Radios,Sensors,SecureControl

How Privoro and Samsung’s Partnership is Ensuring Secure Control of Smartphone Radios and Sensors

Privoro and Samsung Announce Partnership to Provide High-Assurance Mobile Security Solution Introduction On May 8, 2023, Privoro, a renowned mobile security hardware company, announced a new partnership with Samsung Electronics to provide high-assurance control over the radios, sensors, and other peripherals within a commercial mobile device. This new capability aims to provide a critical shield…

Read More
The Evolution of Ransomware: Babuk Code Modified to Attack ESXi VMs by Multiple Groupsransomware,BabukCode,ESXiVMs,cyberattack,cybersecurity

The Evolution of Ransomware: Babuk Code Modified to Attack ESXi VMs by Multiple Groups

Ransomware Hackers Targeting ESXi Hypervisors with Leaked Babuk Code Over the last year, hackers have utilized leaked Babuk ransomware source code to develop lockers for VMware ESXi hypervisors. Hypervisors are programs used to run multiple virtual machines on a single server, and by targeting ESXi, hackers can infect multiple virtual machines in an enterprise environment…

Read More
"IRS collaborates with Ukraine to trace hidden assets of Russian oligarchs using cryptocurrencies"cryptocurrency,IRS,Ukraine,Russianoligarchs,hiddenassets,collaboration

“IRS collaborates with Ukraine to trace hidden assets of Russian oligarchs using cryptocurrencies”

IRS provides assistance to Ukraine for tracking Russian oligarchs’ hidden assets in crypto exchanges The Internal Revenue Service Criminal Investigative Division (IRS-CI) of the United States has donated 15 licenses of the Chainalysis Reactor platform to a team of Ukrainian investigators this week, as part of a larger effort to unravel the financial networks that…

Read More
"Unsecured Software Supply Chains: A Billion-Dollar Risk, Warns Juniper Research Study"cybersecurity,softwaresupplychain,riskmanagement,JuniperResearch,unsecuredsoftware

“Unsecured Software Supply Chains: A Billion-Dollar Risk, Warns Juniper Research Study”

Vulnerable Software Supply Chains Remain a Multi-billion Dollar Problem for Businesses Globally A new study from Juniper Research, a leading expert in the cybersecurity market, has highlighted the need for businesses to prioritize secure software supply chain procedures to avoid cyberattacks. According to the report, the total cost of software supply chain attacks to businesses…

Read More
A Deeper Look at the Surge in Malicious HTML Attachments: Threat Spotlightmalware,HTMLattachments,cyberthreats,cybersecurity,emailsecurity

A Deeper Look at the Surge in Malicious HTML Attachments: Threat Spotlight

Malicious HTML Attachments Dominate Cybersecurity Threats The cybersecurity industry has long warned about the dangers of HTML attachments, and recent data highlights that these continue to pose a huge threat to organizations worldwide. According to the Barracuda cybersecurity team, over 45% of all HTML attachments scanned in March 2023 were found to be malicious, illustrating…

Read More
"Human Error: Cyber Incidents Spike with 1.5x Increase in Daily Cases"cyberincidents,humanerror,dailycases,spike

“Human Error: Cyber Incidents Spike with 1.5x Increase in Daily Cases”

## Kaspersky Report: Spike in Human-Involved Cyber Incidents Detected in 2022 Woburn, MA – May 2, 2023 — Kaspersky’s recent analysis of incidents reported to their Managed Detection and Response (MDR) service customers revealed that Security Operations Center (SOC) analysts discovered more than three high-severity incidents with direct human involvement every day in 2022. The…

Read More
Dragos, a cybersecurity firm, targeted by suspected ransomware attack and extortion attemptcybersecurity,ransomware,extortion,Dragos

Dragos, a cybersecurity firm, targeted by suspected ransomware attack and extortion attempt

## Dragos targeted in suspected ransomware attempt On May 10, 2023, unknown hackers attempted to infiltrate Dragos, one of the leading industrial cybersecurity firms that works with government agencies and utilities globally, in an unsuccessful campaign that targeted the company’s executives and their family members. The incident began with an employee’s compromised personal email, according…

Read More