Ransomware, extortionware, and theft: Are your security strategies really working?
By Jerald Dawkins, Ph.D., CTO, Reflecting on attacks in 2022, reaffirmed what many other reports have stated – that ransomware was on the downward trend…
By Jerald Dawkins, Ph.D., CTO, Reflecting on attacks in 2022, reaffirmed what many other reports have stated – that ransomware was on the downward trend…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: CISO perspective on why boards don’t fully grasp cyber attack…
20,000. That was the approximate number of public suggestions the Indian government received in May over its crucial data privacy regulation. What is appalling is…
The backdoor dropped in the scam had the ability to exfiltrate a wide range of data, including the hostname, username, and a comprehensive list of…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email…
Ukraine’s Computer Emergency Response Team (CERT-UA) states that Russia-linked APT Gamaredon starts stealing data 30 minutes after the initial compromise. Ukraine’s Computer Emergency Response Team…
Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their goals. The APT group, Lazarus,…
China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15, 2023. However, Storm-0558’s campaign was…
Dark Web Secrets: Have you ever wondered about the mysterious parts of the internet? Welcome to the dark web. This uncharted digital territory, inaccessible through…
WormGPT is being offered for sale on a popular hacking forum, enabling malicious actors to exploit its capabilities for nefarious purposes. In a disconcerting development…
IPVM disputes this allegation and says it promptly contacted the FBI upon discovering the crimes. A murdered Russian submarine captain may have been tracked by…
From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An Evolving Threat Landscape. By Jack…