Emotet Malware
24
Jan
2023

Emotet Malware Makes a Comeback with New Evasion Techniques

Jan 24, 2023Ravie LakshmananCyber Threat / Cyber Crime The Emotet malware operation has continued to refine its tactics in an…

Chinese IoT suppliers expose UK businesses to espionage and data theft
24
Jan
2023

Chinese IoT suppliers expose UK businesses to espionage and data theft

Chinese technology companies are supplying components used in a wide range of industrial and domestic smart devices that could expose…

Riot Games
24
Jan
2023

Riot Games receives ransom demand from hackers, refuses to pay

Riot Games says it will not pay the ransom demanded by the attackers responsible for the security breach the company…

Five reasons why Cybersecurity training is important in 2023
24
Jan
2023

Working with AWS to secure your data against attack

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

GoTo now says customers' backups have also been stolen
24
Jan
2023

GoTo now says customers’ backups have also been stolen

GoTo (formerly LogMeIn) has confirmed on Monday that attackers have stolen customers’ encrypted backups from a third-party cloud storage service…

Golang Malware in DragonSpark Attacks
24
Jan
2023

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection

Jan 24, 2023Ravie LakshmananCyber Espionage / Golang Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed…

IT’s shift to the cloud: Veeam’s data protection report in detail
24
Jan
2023

IT’s shift to the cloud: Veeam’s data protection report in detail

IT has undergone a significant shift to the cloud, but may have stabilised – for now – at about half…

Cryptocurrency falling
24
Jan
2023

North Korean hackers stole $100 million in Harmony crypto hack

The FBI has confirmed that the North Korean state-sponsored ‘Lazarus’ and APT38 hacking groups were behind the theft of $100…

Chinsese Hackers Using Golang Source Code Interpreter To Bypass Detection
24
Jan
2023

Hackers Using Golang Source Code Interpreter To Bypass Detection

Researchers uncovered a new uncommon technique employed by Chinese threat actors in which Golang Source Code Interpreter used to evade…

2023 Insider Threat Report Finds Three-Quarters of Organizations are Vulnerable to Insider Threats
24
Jan
2023

2023 Insider Threat Report Finds Three-Quarters of Organizations are Vulnerable to Insider Threats

By Sanjay Raja, VP of Product Marketing and Solutions Insider threats are more dangerous and more top of mind for…

ioSafe 1522+ helps organizations protect data from fire and water
24
Jan
2023

ioSafe 1522+ helps organizations protect data from fire and water

ioSafe introduced the ioSafe 1522+, a five-bay network attached storage (NAS) device for businesses of all sizes, including those with…

Some Vulnerabilities Date Back to the Last Millennium
24
Jan
2023

Some Vulnerabilities Date Back to the Last Millennium

Vulnerability analysis results in Orange Cyberdefenses’ Security Navigator show that some vulnerabilities first discovered in 1999 are still found in…