Cybersecurity Blog
FrostyGoop Malware Used to Shut down Heat in Ukraine Attack
FrostyGoop can disrupt industrial processes by altering values on ICS devices. The malware exploited the Modbus protocol ...
New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure
Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware ...
From RA Group to RA World: Evolution of a Ransomware Group
RA World’s attack methods, mapped to MITRE ATT&CK, include exploiting vulnerable servers for initial access, using ...
How to Securely Onboard New Employees Without Sharing Temporary Passwords
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves ...
Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer ...
Ransomware Takedowns Leave Criminals Scrambling for Stability
A recent report from Europol indicates that the disruption of ransomware-as-a-service (RaaS) groups is causing a ...
Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its ...
UK: NCA Infiltrates DDoS-for-Hire Site as Suspected Controller Arrested in Northern Ireland
The National Crime Agency (NCA) in the United Kingdom has successfully infiltrated a DDoS-for-hire service known as ...