Tesla and Twitter Should be Banned as Threats to Global SecurityAs you may remember, I’ve explained before why and how Elon Musk constantly stands accused of...
OPERA1ER Gang Stole $11M from African Banks and Telecom Companies
OPERA1ER Gang Stole $11M from African Banks and Telecom CompaniesA new technical report published by Group-IB reveals that OPERA1ER, a French-speaking hacking group has stolen at...
ICO Slashes Government Data Breach Fine
ICO Slashes Government Data Breach FineUK regulator reduces penalty by 90%Leer másUK regulator reduces penalty by 90%
New RomCom RAT Campaign Abusing Well-Known Software Brands
New RomCom RAT Campaign Abusing Well-Known Software BrandsThe RomCom RAT (remote access trojan) threat actor has launched a new campaign impersonating the official websites of well-known...
“Disturbing” Rise in Nation State Activity, Microsoft Reports
“Disturbing” Rise in Nation State Activity, Microsoft ReportsThe proportion of cyber-attacks perpetrated by nation states targeting critical infrastructure jumped from 20% to 40%Leer másThe proportion of...
All You Need to Know About Secure Shell Protocol
All You Need to Know About Secure Shell ProtocolAn Ultimate Guide on Secure Shell, What is it, How it Functions, and What is it Used for...
Researchers Detail New Malware Campaign Targeting Indian Government Employees
Researchers Detail New Malware Campaign Targeting Indian Government EmployeesThe Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with...
Your OT Is No Longer Isolated: Act Fast to Protect It
Your OT Is No Longer Isolated: Act Fast to Protect ItNot too long ago, there was a clear separation between the operational technology (OT) that drives...
Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer
Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP StealerCybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository...
BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’
BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’Our sincere thanks to BSidesPDX 2022 for publishing their outstanding conference videos on...
Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities
Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day VulnerabilitiesMicrosoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for...
BEC Group Crimson Kingsnake Linked to 92 Malicious Domains
BEC Group Crimson Kingsnake Linked to 92 Malicious DomainsThe group impersonated 19 law firms and debt collection agencies in the US, UK and AustraliaLeer másThe group...
EPP vs. EDR: What Is Each and How They Differ
EPP vs. EDR: What Is Each and How They DifferWhen it comes to cybersecurity incidents, your company’s endpoints are some of the most important IT assets...
2022 Midterm Election Cybersecurity: Are We Ready?
2022 Midterm Election Cybersecurity: Are We Ready?As we head into the pivotal 2022 midterm elections this week, how prepared are states to ensure votes are properly...
Qualys previews TotalCloud FlexScan for multicloud security management
Qualys previews TotalCloud FlexScan for multicloud security managementVulnerability management vendor Qualys this week announced the trial availability of its TotalCloud with FlexScan offering, an agentless, cloud-native...
Heimdal® Threat Prevention Named Emerging Favorite in Capterra Shortlist For Cybersecurity Software 2022
Heimdal® Threat Prevention Named Emerging Favorite in Capterra Shortlist For Cybersecurity Software 2022Copenhagen, November 4th, 2022 – Heimdal® is proud to announce the mention of our Threat Prevention...
RomCom RAT campaigns abuses popular brands like KeePass and SolarWinds NPM
RomCom RAT campaigns abuses popular brands like KeePass and SolarWinds NPMA new campaign spreading RomCom RAT impersonates popular software brands like KeePass, and SolarWinds. The threat...
LockBit Claims Ransomware Attack on Continental
LockBit Claims Ransomware Attack on ContinentalThe ransomware gang made the announcement on its leak siteLeer másThe ransomware gang made the announcement on its leak site
Windows 11 22H2 blocked on systems using Xbox Game Bar Capture
Windows 11 22H2 blocked on systems using Xbox Game Bar CaptureMicrosoft is now blocking the Windows 11 2022 Update from being offered on some systems because of...
Ransomware rages on – Week in security with Tony Anscombe
Ransomware rages on – Week in security with Tony AnscombeThis week's news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure...
Researchers Find Links Between FIN7 Group and Black Basta Ransomware Gang
Researchers Find Links Between FIN7 Group and Black Basta Ransomware GangSecurity researchers at Sentinel Labs have analyzed the tools used by the Black Basta ransomware gang...
Black Basta Ransomware Attacks Linked to FIN7 Threat Actor
Black Basta Ransomware Attacks Linked to FIN7 Threat ActorThe hacker behind a tool used by Black Basta had access to the source code used by FIN7Leer...
VIP3R: Dissecting A New Venomous Spearphishing Campaign
VIP3R: Dissecting A New Venomous Spearphishing CampaignBy Tom McVey, Solution Architect at Menlo Security Social engineering attacks are among the most prevalent and dangerous […] The...
Robin Banks phishing service returns to steal banking accounts
Robin Banks phishing service returns to steal banking accountsThe Robin Banks phishing-as-a-service (PhaaS) platform is back in action with infrastructure hosted by a Russian internet company that...
Software-Defined Radio for Incident Response
Software-Defined Radio for Incident ResponseBy Brendon McHugh, FAE & Technical Writer, Per Vices Wireless technology has become ubiquitous in people’s lives and […] The post Software-Defined...
Attack Surface Management: Definition, Importance, and Implementation
Attack Surface Management: Definition, Importance, and ImplementationAttack surface management is an important practice many businesses should employ to secure their machines and systems. To defeat them,...
The 6 Biggest Financial Sector Cybersecurity Threats in 2022
The 6 Biggest Financial Sector Cybersecurity Threats in 2022By Veniamin Semionov, Director of Product Management, NAKIVO The financial sector cybersecurity is always a concern because this...
The Artificial Intelligence Tug-of-War: Adversaries vs. Defenders
The Artificial Intelligence Tug-of-War: Adversaries vs. DefendersBy Corey Nachreiner, CSO at WatchGuard Technologies Artificial intelligence (AI) is playing an increasingly important role in cybersecurity. […] The...
EDR vs. NDR vs. XDR: A Comparison
EDR vs. NDR vs. XDR: A ComparisonThreat detection and response (D&R) solutions are an important part of the cybersecurity strategy of your company. This category of...
The Balance of Power: One Disturbance Could Ignite The First Cyber World War
The Balance of Power: One Disturbance Could Ignite The First Cyber World WarBy Guy Golan, Founder and CEO of Performanta The Russian invasion of Ukraine has...



























