The Fonix Ransomware operators have shut down their operation and released the master decryption allowing victims to recover their files for free. Fonix Ransomware, also known as...
The Pro-Ocean cryptojacking malware now comes with the ability to spread like a worm, as well as harboring new detection-evasion tactics. Researchers have identified an updated...
Emotet, one of the most active and dangerous botnets, has been taken down by international authorities, in an operation coordinated by Europol and Eurojust. This email spamming...
As the manufacturing sector is moving towards automation and using software-centric and IoT technologies, cybercriminals see a larger attack surface to target to gain access inside...
UScellular, the fourth-largest wireless carrier in the U.S. with 4.9 million customers, has been hacked. According to a Bleeping Computer report, UScellular filed a breach data notification with...
The cybersecurity industry has embraced MITRE ATT&CK for good reason: it provides security leaders and practitioners an objective, third-party standard with which to evaluate their own...
Cyberbit, provider of Cyber Skills Development Platforms, revealed the results of the first annual Cyberbit SOC Skills Survey. In the fourth quarter of 2020, Cyberbit surveyed...
Enterprises worldwide are accelerating the adoption of passwordless authentication technologies in response to the increase in cybersecurity threats in 2020, according to a new report released...
A new variant of the freshly minted NAT slipstreaming attack has emerged that could use unmanaged, internal network devices as a bridgehead to – in the...
Here are the news and updates you may have missed. It is not accurate to describe widespread cyber intrusions that compromised several government agencies and cybersecurity...