6500+ arrests and €900 million+ seized
Europol has published the results of an infiltration operation on EncroChat, a secure communications system set up by and for criminals. In 2020, we reported on…
Europol has published the results of an infiltration operation on EncroChat, a secure communications system set up by and for criminals. In 2020, we reported on…
Establishing secure access to your cloud MRP system forms the foundation of robust data protection. Let’s dive into the ins and outs of it! In…
Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them. While the use of drones…
Microsoft has released Sysmon 15, converting it into a protected process and adding the new ‘FileExecutableDetected’ option to log when executable files are created. For…
LetMeSpy is a form of phone monitoring app that may be used for parental control or employee surveillance, depending on how the program is promoted.…
Data protection vendor Arcserve has addressed a high-severity security flaw in its Unified Data Protection (UDP) backup software that can let attackers bypass authentication and…
With an increasing number of Chinese-owned companies involved in operating cables and Russia’s interest in mapping the submarine cable system, the report suggests a strong…
A ransomware gang named 8Base was the second most active group in June 2023, claiming roughly 30 victims, VMware reports. Active since March 2022 and…
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. Akira first emerged in March 2023,…
Venn Software, a New York startup building an MDM-like solution for laptops, has attracted $29 million in early stage funding as investors continue to bet…
After the military group named Wagner took over the supremacy realms from Putin for a brief period in the last weekend, a new ransomware is…
Introduction In today’s digital landscape, ensuring the security and performance of web applications is paramount. To achieve optimal protection against cyber threats, organizations deploy web…