Cybersecurity Blog
Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?
Incident response (IR) is a race against time. You engage your internal or external team because there’s enough ...
Ransomware actors hit zero-day exploits hard in 2023
Dive Brief: Ransomware attacks inflicted more financial damage and hit more companies last year than ever before, ...
AI-generated voices in robocalls now illegal – Help Net Security
The FCC has revealed the unanimous adoption of a Declaratory Ruling that recognizes calls made with AI-generated voices ...
Authorities Bust Accused Seller of Widely Used RAT Malware
Cybercrime , Fraud Management & Cybercrime , Malware as-a-Service 2 Men Arrested in Malta, Nigeria for Hawking ...
ExpressVPN Bug has Been Leaking Some DNS Requests for Years
The bug affected versions 12.23.1 – 12.72.0 of ExpressVPN for Windows and allowed some DNS requests to bypass ...
Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11
Feb 12, 2024NewsroomOperating System / Technology Microsoft said it’s introducing Sudo for Windows 11 as part of ...
U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals ...
U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators
Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online ...