Investors largely expected the FOMC to cut rates by a quarter point.The Fedread more
As the Fed was meeting to consider cutting interest rates, it lost control of the very benchmark rate that it manages.Market Insiderread more
Federal Reserve Chairman Jerome Powell said the he does not see the Fed using negative interest rates in the future.The Fedread more
The decision to cut rates followed a monthslong pressure campaign by Trump, who often criticized Chairman Jerome Powell by name as he called for lower interest rates.Politicsread more
The Dow Jones Industrial Average erased a 211-point drop as investors digested the latest monetary policy announcement by the Federal Reserve.US Marketsread more
A New York-based blockchain consulting firm allegedly extorted a Seattle-based crypto start-up with threats to hijack its initial coin offering, in a case announced Wednesday...Technologyread more
According to a report in the Wall Street Journal, WeWork co-founder Adam Neumann has floated the idea of becoming Israel's prime minister or leader of the world.Technologyread more
Powell said on Wednesday that the Fed may have to resume regular balance sheet growth to help ease money markets.The Fedread more
The interest on excess reserves now stands at 1.8%, a 30 basis point cut compared with the 25 basis point reduction for the benchmark funds rate.The Fedread more
Amazon is launching a new feature that allows presidential candidates to receive campaign contributions through the Alexa voice assistant.Technologyread more
The woman says the abuse by Jeffrey Epstein, a former friend of Presidents Donald Trump and Bill Clinton, began when she was just age 14 or younger.Politicsread more
Ukraine said on Saturday that Russian security services were involved in a recent cyber attack on the country, with the aim of destroying important data and spreading panic.
The SBU, Ukraine's state security service, said the attack, which started in Ukraine and spread around the world on Tuesday, was by the same hackers who attacked the Ukrainian power grid in December 2016. Ukrainian politicians were quick to blame Russia for Tuesday's attack, but a Kremlin spokesman dismissed "unfounded blanket accusations".
Cyber security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which conked out computers, hit banks, disrupted shipping and shut down a chocolate factory in Australia.
The attack also hit major Russian firms, leading some cyber security researchers to suggest that Moscow was not behind it.
The malicious code in the virus encrypted data on computers, and demanded victims pay a $300 ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May. But Ukrainian officials and some security experts say the ransomware feature was likely a smokescreen.
Relations between Ukraine and Russia went into freefall after Moscow's annexation of Crimea in 2014 and the subsequent outbreak of a Kremlin-backed separatist insurgency in eastern Ukraine that has killed more than 10,000 people.
Hacking Ukrainian state institutions is part of what Ukraine says is a "hybrid war" by Russia on Kiev. Russia denies sending troops or military equipment to eastern Ukraine.
"The available data, including those obtained in cooperation with international antivirus companies, give us reason to believe that the same hacking groups are involved in the attacks, which in December 2016 attacked the financial system, transport and energy facilities of Ukraine using TeleBots and BlackEnergy," the SBU said.
"This testifies to the involvement of the special services of Russian Federation in this attack."
The SBU in an earlier statement on Friday said it had seized equipment it said belonged to Russian agents in May and June to launch cyber attacks against Ukraine and other countries.
Referencing the $300 ransomware demand, the SBU said "the virus is cover for a large-scale attack on Ukraine. This is evidenced by a lack of a real mechanism for taking possession of the funds ... enrichment was not the aim of the attack."
"The main purpose of the virus was the destruction of important data, disrupting the work of public and private institutions in Ukraine and spreading panic among the people."
A cyber attack in December on a Ukrainian state energy computer caused a power cut in the northern part of the capital Kiev.
The Russian foreign ministry and Federal Security Service did not immediately respond to requests for comment on the latest allegations.
Russian oil major Rosneft was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom had also been infected.
The SBU's accusations chime with some of the findings of the cyber security firm ESET in Slovakia, which said in research published online on Friday that the Telebots group -- which has links to BlackEnergy -- was behind the attack.
"Collecting ransom money was never the top priority for the TeleBots group," it said, suggesting Ukraine was the target but the virus spread globally as "affected companies in other countries had VPN connections to their branches, or to business partners, in Ukraine."
"The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine," it said.
"Prior to the outbreak, the Telebots group targeted mainly the financial sector. The latest outbreak was directed against businesses in Ukraine, but they apparently underestimated the malware' spreading capabilities. That's why the malware went out of control."
Follow CNBC International on Twitter and Facebook.