In this June 19, 2017, file photo, a person types on a laptop keyboard in North Andover, Massachusetts. 

‘Ransomware Diaries:’ Going undercover with the leader of LockBit


Jon DiMaggio, chief security analyst at Analyst1, spent more than a year inside LockBit private channels interacting with LockBitSupp and other members. He recently released a report called “Ransomware Diaries: Volume 1,” that revealed how he infiltrated the group and what he learned while he was on the inside.

A woman walks with a power plant in the background, in Vinnytsia, Ukraine, March 16, 2022. 

Ladder theory: Part II

Critical State
Ukraine’s National Cybersecurity Coordination Center, which opened last year, is a big part of the effort in the country to ramp up its defense against cyberattacks. The center’s office is in the heart of the capital, a five-minute drive from Ukraine’s pa

Ukraine says it’s ramping up its cyberdefense in light of Russian attacks  

In this Aug. 22, 2019, file photo, signs on a bank of computers tell visitors that the machines are not working at the public library in Wilmer, Texas. 

Checking in on the pandemic: Part II

Critical State
a syrine is shown in a close-up photograph and in soft blue focus.

Irish health system says it’s targeted in ransomware attack

Russian President Vladimir Putin delivers a speech during the event marking the 100th anniversary of the Main Directorate of the General Staff of Russian Armed Forces, formerly known as the Main Intelligence Directorate (GRU), in Mosco

Russian hackers: GRU’s Sandworm unit members indicted by US


Cybersecurity expert tells The World host Marco Werman that “these are hackers who are responsible for an incredible rampage across the internet over the last five years.”

Commodities containers are seen at Shahid Rajaee harbor

Iran-Israel cyberattacks threaten unofficial rules of engagement


A recent exchange of alleged cyberattacks on critical infrastructure between the two regional rivals is rattling the Middle East and threatens to change the unofficial but implicit agreement on the rules of engagement.

A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017.

COVID-19 Cyber Threat Intelligence League fights cybercrime amid pandemic


Cybercrime has surged in recent weeks. Hospitals, companies and even individuals are targets. That’s where the COVID-19 Cyber Threat Intelligence League steps in.

Signs direct voters at a polling place in the state's presidential primary election in Greenfield, New Hampshire, Feb. 11, 2020.

MIT researchers sound alarm over voting app’s security flaws

The app, which was created by the Boston-based mobile voting company Voatz, is currently available to some overseas and military voters registered in states that allow for the electronic return of absentee ballots through fax and email.

People stand in voting booth casting ballots

As 2020 US presidential election nears, voter systems are still vulnerable

Security experts say election infrastructure in the US could be vulnerable to the types of hacking operations that took place in the lead-up to the 2016 election.