Who’s Responsible to Secure this Data?
When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security and IT teams understand the…
When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security and IT teams understand the…
The Black Basta ransomware group has allegedly breached the systems of PFC Brakes. The double extortion gang has claimed to have data belonging to the…
Vocus is to acquire private LTE and 5G network specialist Challenge Networks. In a statement, Vocus said the acquisition will let it build LTE and…
Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants, specifically targeting VMware ESXi virtual…
Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people together, facilitating information exchange, sharing…
Although ransomware campaigns declined quarter over quarter in 2022, primarily due to the collapse of more experienced cybercriminal groups, IT leaders still consider them to…
Feb 06, 2023Ravie LakshmananMalvertising / Data Safety An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the…
Bringing together a diverse professional cyber know-how, intellectual fascination with history and culture, and eclectic academic background focusing on diplomacy and the cultures of Central…
The notorious BlackCat (ALPHV) ransomware gang has struck again, targeting America’s belovedn fast-food chain, Five Guys. The gang has listed Five Guys on its data…
QUT said 11,405 individuals had their data breached in a December cyber attack, higher than initial estimates of around 2500 individuals. In a revised statement, the…
Researchers at IT security company Check Point security have flagged Dingo Token as a potential scam after finding a function that allows the project’s owner to…
Hackers Use Google Ads to Install Malware that Evades Antivirus” title=”Hackers Use Google Ads to Install Malware that Evades Antivirus“/> A cluster of virtualized.NET malware…