Cybersecurity Blog
GhostSec Announces Shift in Operations from Ransomware to Hacktivism
The cybercriminal group GhostSec has shifted from ransomware to hacktivism, stating they’ve gathered enough funds ...
Us Offers $5 Million for Info on North Korean IT Workers Involved in Job Fraud
The U.S. government is offering a $5 million reward for information on a network of North Korean IT workers who ...
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea’s ...
Threat Actors Misusing Quick Assist in Social Engineering Attacks Leading to Ransomware
Cybercriminals are exploiting Microsoft’s Quick Assist tool to conduct social engineering attacks and deliver ...
Unsafe Software Development Practices Persist, Despite CISA’s Push
Despite repeated efforts by the CISA to eliminate common software vulnerabilities, unsafe software development practices ...
Flaw in Wi-Fi-Standard can Enable SSID Confusion Attacks
A design flaw in the IEEE 802.11 Wi-Fi standard allows attackers to trick victims into connecting to a less secure ...
Ongoing Malvertising Campaign leads to Ransomware
Cybercriminals have weaponized popular software tools like WinSCP and PuTTY to deliver ransomware, tricking users into ...
CISA Warns of Actively Exploited D-Link Router Vulnerabilities – Patch Now
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting D-Link ...