The cybersecurity researchers at Cisco Talos recently affirmed that threat actors are targeting the widely-used Microsoft 365 cloud-based productivity platform through the Greatness phishing platform, and...
Industrial cybersecurity company Dragos today disclosed what it describes as a “cybersecurity event” after a known cybercrime gang attempted to breach its defenses and infiltrate the...
A new ‘White Phoenix’ ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption. Intermittent encryption is a strategy employed...
QR codes, widely used by legitimate organizations for various purposes, such as advertisements and enforcing parking fees, are also being exploited by scammers for their fraudulent...
Ransomware’s new favorite victim is educational institutions. Ransomware attacks that exploit targets utilizing malicious software code have increased tremendously over the past few years. In addition...
The private code signing keys for the multinational Taiwanese technology business Micro-Star International (MSI) Co., Ltd. have been made public on a dark website by the...
The Five Eyes member nations’ cybersecurity and intelligence agencies collaborated to dismantle the infrastructure of the Snake cyber-espionage malware, originally developed by Russia’s FSB, which had...
WhatsApp has become one of the most widely used platforms for communication among all age groups. With the growing use of this communication platform, cybercriminals have...
Snake malware has plagued international digital networks for nearly two decades; a joint federal effort finally dismantled the web of espionage spyware. The Department of Justice...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large commercial entities.” The Cactus ransomware operation...