A honeypot is a trap on a network that lures and studies cyber-attack techniques of threat actors, alerting defenders to unauthorized access...
Ransomware’s new favorite victim is educational institutions. Ransomware attacks that exploit targets utilizing malicious software code have increased tremendously over the past few years. In addition...
The private code signing keys for the multinational Taiwanese technology business Micro-Star International (MSI) Co., Ltd. have been made public on a dark website by the...
The Five Eyes member nations’ cybersecurity and intelligence agencies collaborated to dismantle the infrastructure of the Snake cyber-espionage malware, originally developed by Russia’s FSB, which had...
WhatsApp has become one of the most widely used platforms for communication among all age groups. With the growing use of this communication platform, cybercriminals have...
Snake malware has plagued international digital networks for nearly two decades; a joint federal effort finally dismantled the web of espionage spyware. The Department of Justice...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large commercial entities.” The Cactus ransomware operation...
Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include credentials, credit card numbers, personal identifiable...
Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. These groups are tracked as Mango Sandstorm (aka Mercury or...
As QR codes continue to be heavily used by legitimate organizations—from Super Bowl advertisements to enforcing parking fees and fines, scammers have crept in to abuse...
Microsoft has started enforcing number matching in Microsoft Authenticator push notifications to fend off multi-factor authentication (MFA) fatigue attacks. In such attacks (also known as push...
Recent Comments