Cybersecurity Blog
Endpoint malware attacks decline as campaigns spread wider – Help Net Security
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite ...
Stayin’ Alive – Targeted Attacks Against Telecoms and Government Ministries in Asia – Check Point Research
Introduction In the last few months, Check Point Research has been tracking “Stayin’ Alive”, an ongoing campaign that ...
ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers
Oct 12, 2023Newsroom The threat actors behind ShellBot are leveraging IP addresses transformed into its hexadecimal ...
National Health Mission Cyberattack: Knight Ransomware Group Takes Responsibility
In a concerning turn of events, the notorious Knight ransomware group has openly declared its involvement in the recent ...
LinkedIn Smart Links Fuel Credential Phishing Campaign
By: Nathaniel Raymond In 2022, the Cofense Phishing Defense Center (PDC) detected phishing campaigns that used LinkedIn ...
How to Guard Your Data from Exposure in ChatGPT
Oct 12, 2023The Hacker NewsData Security / Artificial Intelligence ChatGPT has transformed the way businesses generate ...
Microsoft Defender Thwarts Large-Scale Akira Ransomware Attack
Oct 12, 2023NewsroomThreat Intelligence / Microsoft on Wednesday said that a user containment feature in Microsoft ...
D-Link WiFi Range Extender Vulnerable to Command Injection Attacks
Owners of the D-Link DAP-X1860 extender should limit manual network scans, be cautious of sudden disconnections, and ...