Veritaco CEO Jeffrey Bowie faces charges for allegedly installing malware on hospital computers, violating Oklahoma’s Computer Crimes Act.
Category: cybercrime/malcode – Page 2
Lazarus exploited zero-days in South Korean software, targeting 6 firms with ThreatNeedle and more.
Darcula adds GenAI tools + Lowers phishing skills barrier + 25,000 scam pages taken down.
Without coordinated action, genomic data could be exploited for surveillance, discrimination, or even bioterrorism. Current protections are fragmented, and vital collaboration between disciplines is lacking. Key to successful prevention will be interdisciplinary cooperation between computer scientists, bioinformaticians, biotechnologists, and security professionals – groups that rarely work together but must align.
Our research lays the foundations for improving biosecurity by providing a single, clear list of all the possible threats in the entire next-generation sequencing process.
The paper also recommends practical solutions, including secure sequencing protocols, encrypted storage, and AI-powered anomaly detection, creating a foundation for much stronger cyber-biosecurity.
DPRK hackers stole $137M in 2023 from TRON users via phishing, fueling nuclear programs and cyberattacks.
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software.
“The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs,” Doctor Web said in an analysis.
The trojan has been found embedded in older versions of the software and propagated as a freely available variant of Alpine Quest Pro, a paid offering that removes advertising and analytics features.
Phishing now causes most breaches + MFA kits bypass detection + browser-based tools offer real-time defense.
Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research—could become a prime target for hackers.
A study published in IEEE Access highlights growing concerns over how this powerful sequencing tool—if left unsecured—could be exploited for data breaches, privacy violations, and even future biothreats.
Led by Dr. Nasreen Anjum from the University of Portsmouth’s School of Computing, it is the first comprehensive research study of cyber-biosecurity threats across the entire NGS workflow.
Managing those AI identities will require companies to completely reassess their cybersecurity strategies.
Docker malware fakes Teneo node heartbeats to earn crypto + 63-layer obfuscation hides the code.