Data Center Blog
FrostyGoop Malware Used to Shut down Heat in Ukraine Attack
FrostyGoop can disrupt industrial processes by altering values on ICS devices. The malware exploited the Modbus protocol to directly affect ...
From RA Group to RA World: Evolution of a Ransomware Group
RA World’s attack methods, mapped to MITRE ATT&CK, include exploiting vulnerable servers for initial access, using tools like PsExec and ...
How to Securely Onboard New Employees Without Sharing Temporary Passwords
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of ...
Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment ...
Ransomware Takedowns Leave Criminals Scrambling for Stability
A recent report from Europol indicates that the disruption of ransomware-as-a-service (RaaS) groups is causing a fragmentation of the threat ...
Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its “pay or ...