Cybersecurity Blog
Hacking the Floodgates: US Dams Face Growing Cyber Threats
Critical Infrastructure Security Hacks on Unregulated Dams Can Result in Mass Casualties, Experts and Lawmakers Warn ...
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and ...
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after ...
Google Ad Impersonates Whales Market to Push Wallet Drainer Malware
A legitimate-looking Google Search advertisement for the crypto trading platform ‘Whales Market’ redirects ...
Quishing Attacks Jump Tenfold, Attachment Payloads Halve
Quishing attacks, a form of phishing that leverages QR codes, have significantly increased, climbing from a mere 0.8% in ...
Ransomware Victims Who Pay a Ransom Drops to Record Low
Fraud Management & Cybercrime , Ransomware Experts See Groups Shoot Themselves in the Foot by Yet Again Swindling ...
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
Apr 19, 2024NewsroomCyber Espionage / Threat Intelligence Government entities in the Middle East have been targeted as ...
US Government and OpenSSF Partner on New SBOM Management Tool
The Open Source Security Foundation (OpenSSF), in collaboration with the US government, has launched a new tool to ...