The U.S. Department of Treasury today sanctioned cryptocurrency mixer Blender.io used last month by the North Korean-backed Lazarus hacking group to launder funds stolen from Axie Infinity’s Ronin bridge.
In the wake of the attack, Sky Mavis (the bridge’s creator) revealed that hackers breached the Ronin bridge on March 23 to steal 173,600 Ethereum and 25.5M USDC tokens in two transactions worth $617 million at the time, the largest cryptocurrency hack in history.
Tenet Healthcare Corporation recently experienced a cybersecurity incident in April 2022, which resulted in a temporary disruption to a subset of acute care operations.
The report from Tenet comes on the heels of telephone and computer problems occurring at St. Mary’s Medical Center and Good Samaritan Medical Center in West Palm Beach Florida, that were reported by WPTV NewsChannel 5. Tenet health is the parent company for both of the medical centers.
Patients and staff have contacted WPTV NewsChannel 5 expressing concerns about patient care tied to limits of electronic charting and their inability to communicate by telephone.
When it comes to responding to emerging threats, the Pentagon’s director for electromagnetic warfare suggested today that the US military’s electronic warfare organization should borrow a leaf from SpaceX.
SpaceX founder Elon Musk said that Russia had jammed Starlink terminals in Ukraine for hours at a time after SpaceX shipped Starlink terminals to Ukraine in February in an apparent effort to help Ukraine preserve its internet connection amid the war with Russia. Starlink was back up and running after a software upgrade, according to Musk, who added on March 25 that the constellation had “resisted all hacking & jamming attempts” in Ukraine.
Assuming Musk — who is known for being a showboater in his public pronouncements — is giving an accurate image, a private company thwarting Russian EW attempts with software updates is the kind of thing that makes Pentagon EW experts sit up and take notice.
“That’s wonderful from the standpoint of an EW technologist. Dave Tremper, head of electronic warfare for the Pentagon’s acquisition office, remarked, “That paradigm and how they executed that is sort of eyewatering to me.” “We need to be able to upgrade in the same way that Starlink was able to when a threat appeared. We need to be able to modify our electromagnetic posture quickly, and we need to be able to change what we’re attempting to do without sacrificing capabilities.”
Google Chrome has been successfully hacked yet again with multiple new vulnerabilities that impact the browser across all major platforms. Here’s everything you need to know to stay safe.
New attacks have successfully hacked Google Chrome and users worldwide need to take action…
Nadella told analysts on an earnings call that the operation had reached $10 billion in annual revenue and was “up more than 40%” year over year. In other words, it was outpacing every other major Microsoft product.
The remarks were revelatory. Nadella was known for reviving Microsoft, overseeing a fivefold expansion in market cap by that point in his seven years at the helm. That growth was largely based on turning Microsoft’s cloud business into a more serious threat to Amazon Web Services in a giant market.
By letting investors in on the enormity of Microsoft’s security business, Nadella was casually uncovering a powerful growth engine. Total revenue across the company was up just 14% from the prior year. And by way of comparison, Palo Alto Networks, one of the largest pure-play security software companies, delivered 21% revenue growth over roughly the same period, on a base smaller than $4 billion.
The Quantum ransomware, a strain first discovered in August 2021, were seen carrying out speedy attacks that escalate quickly, leaving defenders little time to react.
The threat actors are using the IcedID malware as one of their initial access vectors, which deploys Cobalt Strike for remote access and leads to data theft and encryption using Quantum Locker.
The technical details of a Quantum ransomware attack were analyzed by security researchers at The DFIR Report, who says the attack lasted only 3 hours and 44 minutes from initial infection to the completion of encrypting devices.
The company’s board and the Tesla CEO hammered out the final details of his $54.20 a share bid.
The agreement marks the close of a dramatic courtship and a sharp change of heart at the social-media network.
Elon Musk acquired Twitter for $44 billion on Monday, the company announced, giving the world’s richest person command of one of its most influential social media sites — which serves as a platform for political leaders, a sounding board for experts across industries and an information hub for millions of everyday users.
The acquisition followed weeks of evangelizing on the necessity of “free speech,” as the Tesla CEO seized on Twitter’s role as the “de facto town square” and took umbrage with content moderation efforts he has seen as an escalation toward censorship. He said he sees Twitter as essential to the functioning of democracy and said the economics are not a concern.
Ownership of Twitter gives Musk power over hugely consequential societal and political issues, perhaps most significantly the ban on former president Donald Trump that the website enacted in response to the Jan. 6 riots.
The 3D-printed containers keep a log of all break-in attempts, meaning your snail mail just got way safer.
Suppose you want to mail a court document to someone across the country—you don’t want anyone to see the secure information inside, of course. So, you seal it into a container that has special sensors built into its walls, and electronics that monitor the shield of sensors. Now, the container is armed and monitoring.
On the way to its intended recipient, let’s say the container is hacked. When the intended recipient later opens the container, they pull out the court document, along with an SD card (just like the ones you might use to store digital photos). They plug the card into a computer and look at the file. They see an encrypted historical record of the container’s experiences, from the time you put that document into the container and sealed it, up until the time they opened it. In the list of messages is a notification about a tampering attack, along with the date and time of the incident. The message also specifies the type of breach detected, such as the container being opened or cut.