Britain’s first ‘Incel’ terrorist: ‘Involuntary celibate’ who had no luck with women pleads guilty to possessing explosives

Britain’s first ‘involuntary celibate’ bomb-maker has pleaded guilty to possessing explosive substances, downloading terror manuals and discussing plans to launch an attack. Anwar Said Driouich, 22, from Middlesbrough, was part of a misogynistic movement named ‘Incel’ which has been associated Read More …

Ryuk Ransomware Keeps Targeting Hospitals During the Pandemic

The Ryuk Ransomware operators to continue to target hospitals even as these organizations are overwhelmed during the Coronavirus pandemic. Last week BleepingComputer contacted various ransomware groups and asked if they would target hospitals and other healthcare organizations during the pandemic. With the Read More …

4G networks vulnerable to denial of service attacks, subscriber tracking

Every 4G network is susceptible to a form of denial-of-service (DoS) attack, researchers say. We are in the early stages of a rollout of 5G, the next-generation wireless technology that will replace 4G, offering improved speeds and latency in the process. However, Read More …

FBI agents kill man allegedly plotting bomb attack on hospital amid coronavirus pandemic

A man fatally injured by the FBI was planning a bomb attack on a medical facility in the Kansas City area, the agency said in a news release on Wednesday. Timothy Wilson, 36, was injured on Tuesday when FBI agents served a Read More …

WildPressure APT targets industrial-related entities in the Middle East

In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Read More …

Monitoring ICS Cyber Operation Tools and Software Exploit Modules To Anticipate Future Threats

There has only been a small number of broadly documented cyber attacks targeting operational technologies (OT) / industrial control systems (ICS) over the last decade. While fewer attacks is clearly a good thing, the lack of an adequate sample size Read More …

The IIoT Threat Landscape: Securing Connected Industries

The Industrial Internet of Things (IIoT) provides bridges of connectedness that enable seamless IT and OT convergence. However, threat actors can cross these bridges to compromise systems. As the use of IoT extends beyond the home and goes into the Read More …

Arab Coalition forces destroy two explosive-laden unmanned boats in the south of Red Sea

Naval Arab Coalition forces intercepted and destroyed two Houthi unmanned boats loaded with explosives, Saudi state news agency SPA reported on Tuesday. The boats, which were launched from Hodeidah, were trying to perform a terrorist attack in the south of Read More …