February Saw Record Ransomware Attacks: Cyble
Ransomware attacks set a single-month record in February that was well above previous highs, according to a Cyble threat intelligence report. The Cyble report measured…
Ransomware attacks set a single-month record in February that was well above previous highs, according to a Cyble threat intelligence report. The Cyble report measured…
The Tails Project announced the release of Tails 6.13 on March 6, 2025, marking a significant update to its privacy-centric Linux distribution. This iteration introduces…
Tax season has become a breeding ground for sophisticated AI-powered scams, with nearly half of Americans reporting fraudulent IRS-related communications, according to McAfee’s 2025 survey.…
Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to the actual stored capacity, according…
Cybersecurity researchers at G DATA have uncovered a sophisticated malware campaign using fake CAPTCHA prompts to deliver LummaStealer, a dangerous information-stealing malware. This emerging threat,…
Forbes Technology Council Member Aliasgar Dohadwala points out that for small and medium enterprises (SMEs), the consequences of ransomware can be catastrophic, with 60 percent of…
Mar 07, 2025Ravie LakshmananMalvertising / Open Source Microsoft has disclosed details of a large-scale malvertising campaign that’s estimated to have impacted over one million devices…
Madoc Batters likes a challenge. As head of cloud and IT security at Warner Leisure Hotels, he’s inherited a big task – leading the UK…
Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident. The data…
Advanced threat actors increasingly leverage x86-64 binaries and Apple’s Rosetta 2 translation technology to bypass execution policies and deploy malware on Apple Silicon devices. The…
A newly discovered network botnet comprising an estimated 30,000 webcams and video recorders—with the largest concentration in the US—has been delivering what is likely to be…
A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute arbitrary code, and bypass critical…