Cybersecurity Blog
Owning a Bitcoin ATM
by Antonio Requena, Gabriel Gonzalez and Sergio Ruiz. Nowadays, Bitcoin and cryptocurrencies might look lees popular ...
Rust Payloads Exploiting Ivanti 0-Days Linked to Sliver Toolkit
Payloads recently found on compromised Ivanti Connect Secure appliances could be from the same, sophisticated threat ...
Great security or great UX? Both, please – Help Net Security
A new user is signing up for a SaaS application. On the one hand, UX teams want that user to get into the app as quickly ...
Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware
Jan 31, 2024NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known as UNC4990 is leveraging ...
The SEC Won’t Let CISOs Be: Understanding New SaaS Cybersecurity Rules
The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now ...
Fulton County government outage: Cyberattack brings down phones, court site and tax systems | CNN Business
CNN — An ongoing cyberattack against Georgia’s Fulton County, which includes parts of Atlanta, has brought some of the ...
Online Ransomware Decryptor Helps Recover Partially Encrypted Files
White Phoenix attempts to recover data through automated restoration methods and may help restore valuable files for ...
Alpha Ransomware Group Launches Data Leak Site on the Dark Web
A new ransomware group called Alpha has recently emerged with the launch of its Dedicated/Data Leak Site (DLS) on the ...