Police Dismantles RedLine and META Infostealer Infrastructure
An international law enforcement operation, led by the United States, Europol, and the Netherlands, has successfully dismantled the infrastructure behind the notorious RedLine and META…
An international law enforcement operation, led by the United States, Europol, and the Netherlands, has successfully dismantled the infrastructure behind the notorious RedLine and META…
With the European Union’s (EU) NIS2 regulations now in full effect, IT leaders across the region report that they are struggling to secure budget to…
QNAP has fixed a critical zero-day vulnerability exploited by security researchers on Thursday to hack a TS-464 NAS device during the Pwn2Own Ireland 2024 competition.…
Dutch police, working with partners from around the world, have made an important achievement by shutting down two well-known groups responsible for stealing information. These…
Latrodectus, a new malware loader, has rapidly evolved since its discovery, potentially replacing IcedID. It includes a command to download IcedID and has undergone multiple…
Russian hackers launched a targeted malware campaign via Telegram, aimed at Ukrainian military recruits. Disguised as recruitment tools, the malware steals data and spreads disinformation,…
If you ever find your home appearing on Google Maps, there’s no need to panic about a potential privacy breach. Instead, you can simply click…
As cyber threats evolve in today’s fast-paced digital landscape, organizations face increasingly sophisticated attacks. In response, EC-Council, a global leader in cybersecurity education and certification,…
Multiple infostealer malware families have developed new techniques to circumvent Google Chrome’s Application-Bound Encryption security feature, which was introduced in July 2024 to protect stored…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not…
Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall SSL VPN devices, where these attacks, initiated…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to significantly enhance their security posture.…