Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua...
Security researchers have devised a way to block the recently disclosed PetitPotam attack vector that allows hackers to take control of a Windows domain controller easily....
Ransomware attacks have been increasingly in the headlines, and reaching historic levels of impact. Findings from a new report from ISACA in partnership with HCL Technologies...
Active shooter events, threat or harm to CEOs, their family members and employees have occurred due to intelligence failures. As COVID-19 vaccinations continue, companies embrace hybrid...
The COVID-19 pandemic opened new doors for scammers. Ranging from phishing attacks to unemployment fraud, no attack vector has gone unexploited. Talking about phishing attempts, your...
A joint report has been published by several global cybersecurity agencies alerting about top exploited vulnerabilities in 2020 and 2021. This joint cybersecurity advisory is issued...
A cyberespionage group based in Iran has been disguising itself as an aerobics instructor on Facebook. This social engineering campaign was ongoing for almost a year...
The U.S Federal Bureau of Investigation (FBI) has issued an official statement about more than 100 active ransomware variants that are busy launching attacks on American...
Encryption algorithms found in a decryptor show that the notorious DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation and is actively performing attacks on...
A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by installing a...
Node.js has released updates for a high severity vulnerability that could be exploited by attackers to corrupt the process and cause unexpected behaviors, such as application...
Recent Comments