Cybersecurity Blog
Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks
Cybersecurity researchers have discovered an attack campaign that targets various Israeli entities with ...
South Korean ERP Vendor’s Server Hacked to Spread Xctdoor Malware
An unnamed South Korean enterprise resource planning (ERP) vendor’s product update server has been found to be ...
Rapid7 To Acquire Attack Surface Management Startup Noetic Cyber
Cybersecurity firm Rapid7 has announced to acquired Noetic Cyber, a startup specializing in cyber asset attack surface ...
Ransomware Attack Demands Reach a Staggering $5.2m in 2024
According to a new analysis by Comparitech, the average ransom demand per ransomware attack in the first half of 2024 ...
Cyber-Insurance Premiums Decline as Firms Build Resilience
Cyber insurance premiums have seen significant reductions in price due to improved cybersecurity measures implemented by ...
Preparing for Q-Day as NIST Nears Approval of PQC Standards
Q-Day, the day when a quantum computer can break modern encryption, is approaching rapidly, leaving our society ...
New Orcinius Trojan Uses VBA Stomping to Mask Infection
This multi-stage trojan utilizes Dropbox and Google Docs to update and deliver payloads. It uses the VBA stomping ...
How Hacked YouTube Channels Spread Scams and Malware
The most common attack methods against YouTube channels involve phishing attacks to steal login credentials, exploiting ...