05/16

Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals | USAO-EDNY | Department of Justice

https://www.justice.gov/usao-edny/pr/hacker-and-ransomware-designer-charged-use-and-sale-ransomware-and-profit-sharing
Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals | USAO-EDNY | Department of Justice

Operation RestyLink: APT campaign targeting Japanese companies, Ryu Hiyoshi

https://insight-jp.nttsecurity.com/post/102hojk/operation-restylink-apt-campaign-targeting-japanese-companies
Operation RestyLink: APT campaign targeting Japanese companies, Ryu Hiyoshi

Malware-analysis-and-Reverse-engineering/APT29-DropboxLoader_analysis.md at main · Dump-GUY/Malware-analysis-and-Reverse-engineering · GitHub

https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/APT29_C2-Client_Dropbox_Loader/APT29-DropboxLoader_analysis.md
Malware-analysis-and-Reverse-engineering/APT29-DropboxLoader_analysis.md at main · Dump-GUY/Malware-analysis-and-Reverse-engineering · GitHub

Europe Agrees to Adopt New NIS2 Directive Aimed at Hardening Cybersecurity

https://thehackernews.com/2022/05/europe-agrees-to-adopt-new-nis2.html
Europe Agrees to Adopt New NIS2 Directive Aimed at Hardening Cybersecurity

Researchers Find Potential Way to Run Malware on iPhone Even When it's OFF

https://thehackernews.com/2022/05/researchers-find-way-to-run-malware-on.html
Researchers Find Potential Way to Run Malware on iPhone Even When it's OFF

Researchers Warn of "Eternity Project" Malware Service Being Sold via Telegram

https://thehackernews.com/2022/05/researchers-warn-of-eternity-project.html
Researchers Warn of "Eternity Project" Malware Service Being Sold via Telegram

Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks – NCC Group Research

https://research.nccgroup.com/2022/05/15/technical-advisory-tesla-ble-phone-as-a-key-passive-entry-vulnerable-to-relay-attacks/
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks – NCC Group Research

Women in cybersecurity: Shattering the myths, once and for all | VentureBeat

https://venturebeat.com/2022/05/14/women-in-cybersecurity-shattering-the-myths-once-and-for-all/
Women in cybersecurity: Shattering the myths, once and for all | VentureBeat

Hackers are exploiting critical bug in Zyxel firewalls and VPNs

https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-bug-in-zyxel-firewalls-and-vpns/
Hackers are exploiting critical bug in Zyxel firewalls and VPNs

403 Forbidden

https://support.apple.com/en-us/HT213256
403 Forbidden

Qakbot/Qakbot_AA_16.05.2022.txt at main · pr0xylife/Qakbot · GitHub

https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_AA_16.05.2022.txt
Qakbot/Qakbot_AA_16.05.2022.txt at main · pr0xylife/Qakbot · GitHub

Risky Biz News: Zyxel firewalls and VPN devices come under attack

https://riskybiznews.substack.com/p/risky-biz-news-zyxel-firewalls-and
Risky Biz News: Zyxel firewalls and VPN devices come under attack

MalwareBazaar | SHA256 e7d6c43601ee3543d0479e397b92ff1251b87560825f80b37c1a9198a9172985 (BumbleBee)

https://bazaar.abuse.ch/sample/e7d6c43601ee3543d0479e397b92ff1251b87560825f80b37c1a9198a9172985/
MalwareBazaar | SHA256 e7d6c43601ee3543d0479e397b92ff1251b87560825f80b37c1a9198a9172985 (BumbleBee)