The biggest targets were companies in healthcare, financial services, and information technology.
The Iranians allegedly sent emails to both Democrats and Republicans while pretending to be the far-right group the Proud Boys. They also nearly pulled off a hack of US newspapers in a bid to change headlines on Nov. 4.
The US government is determined to track down and prosecute the individuals behind DarkSide.
The incident occurs after the FBI warned the public that hackers often exploit holiday weekends to launch ransomware attacks.
The list contains the personal details of people suspected of terrorism.
The FBI identified the suspect, a Greek national who adopted the screen name 'The Bull,' by using undercover agents and tracking the Bitcoin payments to his account.
The Anom company helped international law enforcement arrest over 800 suspected criminals in what marks the FBI's latest attempt to overcome encryption.
The White House says the DarkSide variant is a ransomware-as-a-service attack, meaning criminal affiliates conduct attacks and then share the proceeds with ransomware developers.
The North Korean men are allegedly part of the Lazarus hacking group, which has targeted banks and cryptocurrency exchanges around the globe.
The US Justice Department also seized a site that the Netwalker ransomware used to communicate with victims.
The US claims the five Chinese citizens are members of APT 41, a hacking group connected to hacks of CCleaner and Asus’s Live Update tool, which secretly downloaded malware to customer computers.
The FBI seizes the internet domain to WeLeakInfo.com, a site that was cataloging billions of records, such as email addresses and passwords, from more than 10,300 data breaches at various companies and service providers.
Scammers looking to dupe customers of wireless carrier EE sent text messages containing a legit-looking domain and asked people to click and log in. But UK-based technologist Terence Eden noticed that something was amiss.
The solution is designed to act as a kill switch if a thief ever tries to steal your laptop in a public place. The software engineer Michael Altfield published a blog post on how to create the USB 'kill cord' for only $20.
After a malware attack, the University of Giessen is forcing students and employees to pick up new passwords in person to comply with strict legal requirements, prompting long lines of people outside the school gym.
In the ruling, the judge pointed to the secrecy agreements Snowden signed, which required him to first submit the book to the CIA and the NSA for approval before publication.
The breach at Canada's LifeLabs affected 15 million customers, but a small subset of 85,000 customers also had their lab test results exposed to the hackers. LifeLabs claims it secured the data by paying off the attackers.
Moscow resident Maksim Yakubets has been engaged in a 'decade-long cybercrime spree' to spread two infamous malware strains, Dridex and Zeus, according to law enforcement. He's also allegedly doing work for the Russian government.
Malicious Javascript code was injected into the Smith & Wesson's website on Nov. 27 and remained there until Tuesday morning. It was designed to spoof the checkout process to steal payment card details.
Currently, US citizens can opt out of the facial scans, which have been occurring at major US airports. But last month, the Department of Homeland Security proposed amending the rule to require everyone submit to the facial scans.