Top 100 Cybersecurity Hackers

The following list, in no particular order, contains the names, their countries of origins, their (biggest) victim (s) and a short piece about who they are. Some are reformed and act as security consultants while others remain at large and are being hunted by the FBI, InterPol and others for their cybercrimes: Behzad Mesri Country: … Continue reading Top 100 Cybersecurity Hackers

LazyScripter hackers target airlines with remote access trojans

Security researchers analyzing multiple sets of malicious emails believe they uncovered activity belonging to a previously unidentified actor that fits the description of an advanced persistent threat (APT). The actor received the name LazyScripter and has been active since 2018, using phishing to target individuals seeking immigration to Canada for a job, airlines, and the … Continue reading LazyScripter hackers target airlines with remote access trojans

How Neurodiversity Can Strengthen Cybersecurity Defense

Team members from different backgrounds, genders, ethnicities, and neurological abilities are best equipped to tackle today's security challenges. The cybersecurity skills shortage and workforce gap continue to be of concern to organizations. As they seek to protect digital assets by finding professionals with the right skills, demand remains higher than supply. With recent surveys suggesting … Continue reading How Neurodiversity Can Strengthen Cybersecurity Defense

Game Over: Stopping DDoS Attacks Before They Start

Video games are poised for a revolution, but benefits will come to fruition only if the industry can guarantee consistent performance and availability. At one point or another, all online gamers have suffered from a sudden time lag or lost Wi-Fi connection at a crucial moment. Most players find these issues frustrating, but in some … Continue reading Game Over: Stopping DDoS Attacks Before They Start

Beware: New Matryosh DDoS Botnet Targeting Android-Based Devices

A nascent malware campaign has been spotted co-opting Android devices into a botnet with the primary purpose of carrying out distributed denial-of-service (DDoS) attacks. Called "Matryosh" by Qihoo 360's Netlab researchers, the latest threat has been found reusing the Mirai botnet framework and propagates through exposed Android Debug Bridge (ADB) interfaces to infect Android devices … Continue reading Beware: New Matryosh DDoS Botnet Targeting Android-Based Devices