Toggle light / dark theme

US government offers $10 million bounty for information on Colonial Pipeline hackers

Fighting ransomware with bounties.


In May, a ransomware attack shut down a pipeline carrying 45 percent of the fuel used on the US East Coast. The Colonial Pipeline incident led to panic buying and heightened fears about the threat posed by simple hacks to national infrastructure. Now, the US State Department is offering a bounty of up to $10 million to anyone who can supply the “identity or location” of the leaders of the group responsible — an outfit known as DarkSide.

In addition to the $10 million bounty, the state department is offering a reward of up to $5 million for information leading to the arrest or conviction “of any individual conspiring to participate in or attempting to participate in a DarkSide variant ransomware incident.” What exactly that means isn’t clear. Is a “DarkSide variant ransomware incident” one that involves the group’s hacking tools? What if the software has been altered slightly? It seems deliberately ambiguous, allowing the State Department to cast as wide a net as possible.

Microsoft Fends Off 2.4Tbps DDoS Attack, Second Largest on Record

A DDoS attack essentially tries to down a website or internet service by bombarding the system with a flood of data traffic. To do so, the hacker can sometimes harness botnets, or armies of malware-infected computers, to generate the traffic.

In this case, the attack originated from “70,000 sources” based in countries across Asia and the US, Microsoft says. Whether the hacker used a botnet was left unsaid. But the UDP protocol was exploited in what’s known as a “reflection attack” to amplify the data traffic to 2.4Tbps.

Critical RCE Vulnerability Reported in Linux Kernel’s TIPC Module

Critical RCE Vulnerability Reported in Linux Kernel’s Transparent Inter Process Communication (TIPC) module.


Cybersecurity researchers have disclosed a security flaw in the Linux Kernel’s Transparent Inter Process Communication (TIPC) module that could potentially be leveraged both locally as well as remotely to execute arbitrary code within the kernel and take control of vulnerable machines.

How to Make a Metal Detector From old TV

Hello Friends, in this video i will show you How to Make a Metal Detector from old Tv at Home in very easy way, I hope everyone like this video. Thank you for watching! Please LIKE, COMMENT and SUBSCRIBE for More Updates.
SUBSCRIBE -
Link for Membership in my Channel — ((((https://tinyurl.com/yufmjy4h))))
Friends, my name is Jordan, am the author of the Handmade Creative channel.
On this channel I present everything that I have done with my own hands. I enjoy sharing Projects I make as a Hobbyist, and what i have learned through other content creators, I am NOT a Professional, not a Teacher, my hope is I simply Inspire you to go make something yourself. We turn simple things into unique ones! Subscribe, it will be interesting!

-Creative ideas.
–useful tips.
–homemade tools.
- hacks.
- review.
–toys.

Follow me.
SUBSCRIBE -
My Patreon For Support
Facebook Page — http://tiny.cc/6qpcbz.
Facebook Group — http://tiny.cc/9tpcbz.
Blogger — http://tiny.cc/75qcbz.
Pinterest — http://tiny.cc/fvpcbz.
Instagram — http://tiny.cc/fcqcbz.
Twitter — http://tiny.cc/ndqcbz.
Reddit — http://tiny.cc/75qcbz

/* */