Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
Richard Forno, University of Maryland, Baltimore County
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
The federal government has a lot of cybersecurity resources, but the private sector plays a key role in national cyber defense.
U.S. government
Richard Forno, University of Maryland, Baltimore County
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
Hackers are just one part of a supply chain in a multimillion-dollar black market for stolen data.
Peach_iStock via Getty Images
The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.
Peiter “Mudge” Zatko was Twitter’s security chief. What he claims he found there is a security nightmare.
Photo by Matt McClain/The Washington Post via Getty Images
Richard Forno, University of Maryland, Baltimore County
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
Your digital footprints can give hackers clues about you that they can use to trick you.
Ivan/Flickr
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace.
Sergei Supinsky/AFP via Getty Images
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Defending against cyberattacks increasingly means looking for patterns in large amounts of data – a task AI was made for.
Yuichiro Chino/Moment via Getty Images
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware.
Andrew Harnik - Pool/Getty Images
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
Shortly after taking office, President Biden declared that the the U.S. would no longer roll over in the face of Russian cyberattacks.
AP Photo/Evan Vucci
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities.
AP Photo/Jerome Delay
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.