Qilin’s RaaS Program
16
May
2023

Qilin’s RaaS Program Advertised on Dark Web

In March 2023, Group-IB’s Threat Intelligence team accessed the Qilin ransomware (Agenda ransomware) group and discovered that it is a…

New crawler enables smarter scans and more relevant findings
16
May
2023

New crawler enables smarter scans and more relevant findings

The crawler is the heart of the Detectify service. During the crawling phase, Detectify is trying to collect all possible…

Specops - Hacker using computer
16
May
2023

Ransomware Prevention – Are Meeting Password Security Requirements Enough

As ransomware attacks continue to wreak havoc on organizations worldwide, many official standards and regulations have been established to address…

VirusTotal AI code Analysis
16
May
2023

Insurance Industry Suffers 12x More Cyber Attacks

The Insurance industry was the most targeted sector in Q1, 2023, according to Indusface’s State of Application Security report, with…

Hacker looking at infected devices
16
May
2023

Hackers infect TP-Link router firmware to attack EU entities

A Chinese state-sponsored hacking group named “Camaro Dragon” infects residential TP-Link routers with a custom “Horse Shell” malware used to…

Preventing sophisticated phishing attacks aimed at employees
16
May
2023

Encrypting files and emails: A beginner’s guide to securing sensitive information

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Nozomi delivers Vantage IQ to strengthen cybersecurity and resilience for critical infrastructure
16
May
2023

Nozomi delivers Vantage IQ to strengthen cybersecurity and resilience for critical infrastructure

Nozomi Networks has introduced Vantage IQ, the AI-based analysis and response engine designed to address security gaps and resource limitations…

Executive interview: DNS designer Eric Holtzman discusses net security
16
May
2023

Executive interview: DNS designer Eric Holtzman discusses net security

The domain name system (DNS) which enables any computer on the internet to be identified in a human-readable form, is…

Decoding the HackerOne Code of Conduct
16
May
2023

Decoding the HackerOne Code of Conduct

When hackers participate in programs on the HackerOne platform, they agree to help empower our community by following the HackerOne…

Hacker
16
May
2023

Russian ransomware affiliate charged with attacks on critical infrastructure

The U.S. Justice Department has filed charges against a Russian citizen named Mikhail Pavlovich Matveev (also known as Wazawaka or…

Google AI powered driverless vehicles making San Francisco a testing ground
16
May
2023

Google AI powered driverless vehicles making San Francisco a testing ground

If you browse online news sources covering San Francisco, it’s evident that there is a recurring theme of articles highlighting…

Exploit TP-Link Routers
16
May
2023

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks

May 16, 2023Ravie LakshmananNetwork Security / Threat Intel The Chinese nation-state actor known as Mustang Panda has been linked to…