Home » security » Page 8
MonoLock ransomware toolkit for sale on dark web forum screen capture

MonoLock Ransomware: What Security Teams Must Know Today

Actors on underground forums are now selling a turnkey ransomware toolkit named MonoLock v1.0 designed to target small and medium organisations, disable backups, encrypt data at scale via AES-256/RSA-2048, and demand payment through an automated Tor portal. Security teams must recognise this shift in the ransomware-as-a-service (RaaS) business model and reinforce detection, defence and incident response accordingly.

Read More
Conference hall in Hanoi showing cybersecurity delegates at United Nations treaty signing

UN Cybercrime Pact to Sign in Hanoi: What Analysts Should Know

The UN is set to convene a landmark global cybercrime treaty signing in Hanoi, aiming to enhance cross-border cooperation and streamline investigations into ransomware, phishing and online trafficking. While supporters hail the pact as overdue, human-rights advocates and tech firms warn the broad language and choice of host country raise serious concerns about surveillance and enforcement.

Read More
Amazon Web Services data-centre engineer standing before server racks after a major outage

AWS Outage Forces Spotlight on Amazon Engineering Talent Loss

The recent outage at AWS’s US-EAST-1 region grounded dozens of major services and exposed a deeper issue: the loss of senior engineering expertise at Amazon. As widespread apps and platforms went offline, one question loomed large: Can the world’s largest cloud infrastructure sustain itself amid massive talent reductions? Below, we analyse the root causes, implications and lessons for infrastructure reliability.

Read More
GlassWorm malware infection in VS Code extensions showing invisible code and supply-chain compromise.

GlassWorm Exploit Breakdown Self-Propagating Worm in VS Code

GlassWorm is the first known self-propagating worm targeting developer environments by infecting VS Code extensions with hidden Unicode payloads. Once installed, it steals credentials from NPM, GitHub and Git, and upgrades machines into proxy nodes and part of a distributed criminal infrastructure. It uses a blockchain-based command and control mechanism and auto-updates to spread across the developer ecosystem. In this article, we dissect how GlassWorm works, what makes it a paradigm shift in supply-chain attacks, and what organisations must do to detect and contain it before their dev workstations become weaponised.

Read More