Scottish law firm Scullion Law suffers cyber attack

Scullion Law, which has offices on George Street Edinburgh, as well as in Glasgow, Hamilton and Madrid, had 155GB of data stolen in the attack by Black Basta. A spokesperson for the award-winning firm said: “We can confirm that we Read More …

OpenAI’s new ‘Voice Engine’ clones your voice in only 15 seconds

As artificial intelligence (AI) continues to advance rapidly, ChatGPT maker OpenAI is at the forefront of this progress. The research lab has unveiled a powerful new voice cloning technology called Voice Engine. With just a 15-second audio sample, it can Read More …

HPSCI: Bill Seeks to Expand Surveillance Powers to Combat International Drug Trafficking

In a significant move on Capitol Hill, Representatives Chrissy Houlahan (D-PA) and Dan Crenshaw (R-TX), both serving on the House Permanent Select Committee on Intelligence, this week introduced a groundbreaking bipartisan bill aimed at bolstering the United States’ efforts against Read More …

Backdoor found in widely used Linux utility targets encrypted SSH connections

Researchers have found a malicious backdoor in a compression tool that made its way into widely used Linux distributions, including those from Red Hat and Debian. The compression utility, known as xz Utils, introduced the malicious code in versions ​​5.6.0 Read More …

Massachusetts healthcare provider warns patients of data breach

A Massachusetts healthcare provider is warning patients of a recently discovered data breach that compromised some personal information. Brigham and Women’s Physician Organization, a Mass General Brigham Incorporated member, is notifying individuals of an incident it became aware of on Jan. Read More …

The impact of compromised backups on ransomware outcomes

There are two main ways to recover encrypted data in a ransomware attack: restoring from backups and paying the ransom. Compromising an organization’s backups enables adversaries to restrict their victim’s ability to recover encrypted data and dial-up the pressure to Read More …

Cloud Werewolf spearphishes Russian and Belarus government employees with fake spa vouchers and federal decrees

The BI.ZONE Threat Intelligence team has revealed another campaign by Cloud Werewolf aiming at Russian and Belarusian government organizations. According to the researchers, the group ran at least five attacks in February and March. The adversaries continue to rely on Read More …

Phishing Attack Targets Apple Users With Password Resets

If you suddenly receive dozens of password-reset notifications on your iPhone, watch out: You’re probably facing a devious phishing attack targeting Apple users. The malicious tactic is intended to to trick iPhone users into handing over access to their Apple Read More …

Hackers threaten to release ‘huge volume’ of stolen NHS Scotland data

A cybercrime group has claimed it will release a large volume of NHS Scotland data stolen during a sustained hacking attack. INC Ransom, an extortion operation, has posted a message on its dark web blog, threatening to release three terabytes Read More …