AvosLocker Group Claims Pembina County Hospital Cyberattack
In a string of ransomware attacks, the United States-based Pembina County Memorial Hospital was listed as victim by a cybercriminal group. While AvosLocker claimed the…
In a string of ransomware attacks, the United States-based Pembina County Memorial Hospital was listed as victim by a cybercriminal group. While AvosLocker claimed the…
Maintaining the security of the digital assets within the Defense Industrial Base (DIB) contractor networks helps defend the United States of America. For the last…
The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial…
An unauthenticated RCE flaw (CVE-2023-27350) in widely-used PaperCut MF and NG print management software is being exploited by attackers to take over vulnerable application servers,…
A financially-motivated North Korean threat actor is suspected to be behind a new Apple macOS malware strain called RustBucket. “[RustBucket] communicates with command and control…
Amazon Web Services (AWS) is coming under pressure to provide easier access to more detailed data about its greenhouse gas (GHG) emissions, as the cloud…
TL;DR: On January 7, the Detectify security research team found that the .cd top-level domain (TLD) was about to be released for anyone to purchase and claimed…
Google has made available a new tool for Google Workspace admins and security teams to make an assessment of the risk different Chrome extensions may…
Lloyds Banking Group has joined the Banking Industry Architecture Network (Bian), which will see the UK giant contribute its expertise to the group and promote…
One of the most challenging parts of finishing a post is coming up with a good image. The AI art tools like DALL-E, Midjourney, and…
Cyberattackers leveraged more than 500 unique tools and tactics in 2022, according to Sophos. The data, analyzed from more than 150 Sophos Incident Response (IR)…
Ransomware continues to be the most common “end game” scenario in a cyber attack, accounting for 68.4% of all incidents to which the Sophos X-Ops…