News&Articles

A Guide to Surviving a Ransomware Attack

A Guide to Surviving a Ransomware Attack

Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack...

ZuoRAT Can Take Over Widely Used SOHO Routers

ZuoRAT Can Take Over Widely Used SOHO Routers

Devices from Cisco, Netgear and others at risk from the multi-stage malware, which...

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

Patchable and Preventable Security Issues Lead Causes of...

Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external...

Leaky Access Tokens Exposed Amazon Photos of Users

Leaky Access Tokens Exposed Amazon Photos of Users

Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal...

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate...

CISA warns that threat actors are ramping up attacks against unpatched Log4Shell...

‘Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

‘Killnet’ Adversary Pummels Lithuania with DDoS Attacks...

Cyber collective Killnet claims it won’t let up until the Baltic country opens trade...

Mitel VoIP Bug Exploited in Ransomware Attacks

Mitel VoIP Bug Exploited in Ransomware Attacks

Researchers warn threat actors are using a novel remote code execution exploit to...

Top Six Security Bad Habits, and How to Break Them

Top Six Security Bad Habits, and How to Break Them

Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need...

Google Warns Spyware Being Deployed Against Android, iOS Users

Google Warns Spyware Being Deployed Against Android, iOS...

The company is warning victims in Italy and Kazakhstan that they have been targeted...

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

The APT is pairing a known Microsoft flaw with a malicious document to load malware...

Elusive ToddyCat APT Targets Microsoft Exchange Servers

Elusive ToddyCat APT Targets Microsoft Exchange Servers

The threat actor targets institutions and companies in Europe and Asia.

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

Discovery of 56 OT Device Flaws Blamed on Lackluster Security...

Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational...

Gamification of Ethical Hacking and Hacking Esports

Gamification of Ethical Hacking and Hacking Esports

Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why...

Voicemail Scam Steals Microsoft Credentials

Voicemail Scam Steals Microsoft Credentials

Attackers are targeting a number of key vertical markets in the U.S. with the active...

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

Office 365 Config Loophole Opens OneDrive, SharePoint Data...

A reported a "potentially dangerous piece of functionality" allows an attacker to...

Kazakh Govt. Used Spyware Against Protesters

Kazakh Govt. Used Spyware Against Protesters

Researchers have discovered that a Kazakhstan government entity deployed sophisticated...

Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management

Modern IT Security Teams’ Inevitable Need for Advanced...

Traditional vulnerability management programs are outdated, with little to no innovation...

China-linked APT Flew Under Radar for Decade

China-linked APT Flew Under Radar for Decade

Evidence suggests that a just-discovered APT has been active since 2013.

Facebook Messenger Scam Duped Millions

Facebook Messenger Scam Duped Millions

One well crafted phishing message sent via Facebook Messenger ensnared 10 million...

Ransomware Risk in Healthcare Endangers Patients

Ransomware Risk in Healthcare Endangers Patients

Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of...

State-Sponsored Phishing Attack Targeted Israeli Military Officials

State-Sponsored Phishing Attack Targeted Israeli Military...

Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli...

In Cybersecurity, What You Can’t See Can Hurt You

In Cybersecurity, What You Can’t See Can Hurt You

The dangers to SMBs and businesses of all sizes from cyberattacks are well known....

Travel-related Cybercrime Takes Off as Industry Rebounds

Travel-related Cybercrime Takes Off as Industry Rebounds

Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention...

DragonForce Gang Unleash Hacks Against Govt. of India

DragonForce Gang Unleash Hacks Against Govt. of India

In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here