The U.S. Federal Bureau of Investigation is launching the Virtual Asset Exploitation Team (VAXU) to investigate crypto-crime.
The FBI is warning consumers to be aware of scammers impersonating high-level company executives to trick employees into transferring money.
The FBI and Secret Service have seen signs of BlackByte ransomware attacking at least three critical infrastructure sectors in the U.S.
- Apple TV+ Makes 'The Afterparty' Premiere Episode Available on YouTube
- Apple TV+: How Lavinia's Love Life Was All The Drama in 'Dickinson'
- Apple Releases 'Unity Lights' Watch Face for Black History Month
- 'Tweetbot' 6.9 Update Adds Widgets for Tweet Stats, More
- Tripp Mickle's Book 'After Steve' Covers Apple's Rise to Trillions
- 'Fraggle Rock: Back to the Rock' Guest Stars Ed Helms, Cynthia Erivo, Daveed Diggs Play Frictionary
The FBI has issued a flash report this week that details indicators of compromise (IOC) linked to LockBit 2.0 ransomware.
The FBI is warning that an Eastern European cybercriminal group is mailing USB drives filled with BadUSB malware to various companies.
Hackers took over an FBI server over the weekend, sending thousands of fake cyberattack warnings. The agency says no personal information or data was affected.
The agency said it has fixed the software vulnerability that allowed the attack.
The fake emails originated from an FBI-operated server, which was dedicated to pushing notifications to the Law Enforcement Enterprise Portal (LEEP), which the FBI uses to communicate with state and local agencies. The compromised server was not part of the FBI’s corporate email service, the FBI added.
An internal document for the FBI reveals how the agency obtains phone location data from carriers like AT&T, Verizon, and others.
The FBI, working with Cyber Command, the Secret Service, and other countries, took down REvil.
According to three people familiar with the matter, law enforcement and intelligence cyber specialists were able to hack REvil’s computer network infrastructure, obtaining control of at least some of their servers. After websites that the hacker group used to conduct business went offline in July, the main spokesman for the group, who calls himself “Unknown,” vanished from the internet.