The Food & Drug Administration (FDA) has released new cybersecurity guidelines for the medical devices industry in the US. The guidelines will require medical device manufacturers to provide more documentation to demonstrate how their devices are protected from cyber intrusion, and how they plan to respond to any vulnerabilities. The FDA’s new regulations are part […]
Blog Grid
Operation Cookie Monster, a coordinated international law enforcement operation, led to the dismantling of Genesis Market, an illegal online marketplace for stolen credentials. The operation resulted in 119 arrests, 208 property searches across 13 countries, and involved authorities from 17 countries. Genesis Market was a prolific initial access broker (IAB) that offered access to data […]
A new version of the BlackGuard stealer has been discovered with new features that make it more dangerous. The malware, sold as a MaaS, targets a wide range of information, including cookies and credentials stored in web browsers, messaging and gaming apps, email clients, and VPN tools. The new features of the malware include a […]
Amazon has launched an accelerator program aimed at attracting startups focused on generative AI to its cloud services, in an effort to compete with rivals Microsoft and Alphabet. Startups will have the opportunity to apply to the 10-week Amazon Web Services program, which will offer up to $300,000 in AWS credits and networking and mentorship […]
The head of the National Security Agency’s cybersecurity directorate, Rob Joyce, has said that TikTok poses a strategic issue for the US, rather than an immediate tactical threat. He reiterated the agency’s previous concerns that the Chinese-owned app represents a “loaded gun” that China could use to control the information Americans see. Some experts, however, […]
STYX is a new dark web marketplace that was launched earlier this year and offers various illegal services and stolen data for sale. Among the services provided on the platform are identity theft, money laundering, DDoS, fake or stolen IDs, renting malware, bypassing 2FA, email and telephone flooding, identity lookup, and more. STYX uses an […]