The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL servers. The threat actors target poorly managed MS...
Blockchain analysts blame the North Korean Lazarus hacking group for a recent attack on payment processing platform Alphapo where the attackers stole almost $60 million in...
After noting the increasing number of cyberattacks on U.S. networks, the SEC is asking company leadership for quick cyber incident disclosures and more documentation. The Securities...
A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches, according to Swimlane. The research...
The ALPHV ransomware gang, also referred to as BlackCat, is trying to put more pressure on their victims to pay a ransom by providing an API...
As per reports, threat actors have been using domestic VPN installation files for distributing SparkRAT malware which leads to MeshAgent infection on the victim systems. The difference between...
Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their computing power. Cloud computing abuse leads to...
The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about...
CISA’s Continuous Diagnostics and Mitigation program uses close collaboration with federal agencies to identify and respond to cyber threats, including last month’s MOVEit breach. The Cybersecurity...
A new report noted that a lack of “established policies and procedures” could prevent the tax agency from meeting federal requirements. An Internal Revenue Service watchdog...