They're the new kids on the block, and their "extortion and destruction" hacks are swiping gigabytes of sensitive data. Their leader also might be 16.
Experts worry machine learning's reliance on large data sets to train make them particularly vulnerable to data manipulation attacks.
Last year, a ransomware gang bragged about jacking the noxious gun lobby's data. In a recent filing, the NRA confirmed the hackers were telling the truth.
A threat actor with longstanding ties to the Chinese government has targeted half a dozen state governments, research from cybersecurity giant Mandiant shows.
The group has previously hit companies like Shutterfly with vicious ransomware attacks.
For over half a decade, the Trickbot botnet has caused global amounts of trouble. Now, the cybercriminals behind it may be pivoting to other endeavors.
The Cole County prosecuting attorney said that the issue had already been resolved through non-legal means.
A recent study shows the tactics and techniques of a cybercrime group that is known for planting incriminating evidence on the devices of activists in India.
The right-wing Twitter alternative is apparently having big financial problems. The solution? Layoff its entire IT staff.
A new report claims that an "independent hacker" took down North Korea's internet because he was mad that the country's government had targeted him.
A whistleblower alleges that the scandal-ridden NSO Group once offered "bags of cash" to his company to buy access to U.S. mobile networks.
U.S. agencies considered buying "Phantom," a previously unknown spyware system from NSO Group, even after ongoing allegations of misconduct emerged.
Reports of a hacktivist attack on the railway system in Belarus still have not been confirmed, but that doesn't make them any less fascinating.
New research shows cybercriminals are increasingly targeting Instagram accounts with high follower counts and attempting to extort their owners.
Commercial satellites are increasingly vulnerable to hacking and need additional protections, according to lawmakers.
Athletes were told they should assume any and all communications could be monitored by the Chinese government during the Olympic games.
The "malicious USB stick" trick is old but apparently it's still wildly popular with the crooks.
Two-factor authentication is a widely used and trusted security mechanism, but criminals are increasingly using malicious toolkits that can outwit it.
Frightening exploits sold by the embattled Israeli spyware vendor have been used to hack people all over the world. Now researchers have unpacked how it works.
Garrett metal detectors, which are used in schools and government buildings, have security vulnerabilities that can be remotely exploited.