The notorious NoName ransomware group has declared its responsibility for a cyberattack on Latvia, targeting prominent Latvian institutions. The affected…
The notorious INC ransomware group has struck again, adding seven prominent organizations to their growing list of victims. The group,…
MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that…
Nov 23, 2023NewsroomMalware / Threat Analysis Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader…
Data Loss Prevention (DLP) programs have emerged as a crucial component of an organization’s cybersecurity strategy. However, implementing a DLP…
Altcoins, or alternative cryptocurrencies, diversify the crypto landscape, offering investors options beyond Bitcoin and influencing market dynamics. Their innovation and…
North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software Pierluigi Paganini November 23, 2023 North Korea-linked APT…
Mac users were targeted by a fake browser update chain called ‘ClearFake’, which was delivered by Atomic Stealer to compromise…
A new attack chain campaign has been discovered, which involves the exploitation of CVE-2023-36884 and CVE-2023-36584. CVE-2023-36884 was a remote…
At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week,…
“When we’re doomscrolling, we’re kind of looking for the resolution to the issue. Read some more posts. Read some more…
Law enforcement agencies in North America have issued a warning regarding the Scattered Spider cyber-attacks, citing their adoption of aggressive…











