8 Best Ways of Staying Ahead of APT Attacks
If you’re not already familiar with the dangers of Advanced Persistent Threats (APTs), then now is probably the right time to educate yourself on this topic. Most people will haveRead More →
If you’re not already familiar with the dangers of Advanced Persistent Threats (APTs), then now is probably the right time to educate yourself on this topic. Most people will haveRead More →
Security incidents sometimes transcend affected organizations, reaching levels of impact that IT security teams cannot foresee. This is the case with the data breach in BigBasket, which resulted in theRead More →
FireEye cybersecurity specialists published details of a recent research related to the DarkSide ransomware operation. This week experts released reports on five groups allegedly associated with this ransomware-as-a-service (RaaS) platform,Read More →
The recent cybersecurity incident at the University of California led to the compromise of confidential information, as confirmed by university executives this week. This unauthorized access was reportedly realized throughRead More →
Uploading files is very common on a good percentage of websites around the world. Platforms like LinkedIn or Facebook allow users to upload images, MP3, MP4, PDF files and manyRead More →
Spanish authorities report the emergence of a new phishing variant targeting users of social media platforms like Instagram. According to the report, threat actors try to take control of accountsRead More →
Local media and security researchers in Pennsylvania, U.S., report that a specialized unit of the Federal Bureau of Investigation (FBI) is investigating multiple hacking attempts against two major public waterRead More →
Cybersecurity specialists report detecting a new wave of attacks potentially linked to the Avaddon ransomware variant. This is a strain detected in early 2019 and is advertised as an asRead More →
Cybersecurity specialists report that a hacker or hacker group has been adding malicious servers to the Tor network in order to intercept traffic and perform an SSL attack variant targetingRead More →
U.S. authorities agreed the emergency pass of a new law after the country’s main pipeline was compromised by a ransomware attack that severely disrupted operations. Colonial Pipeline carries more thanRead More →