Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
Storm-0501 targets U.S. sectors for ransomware attacks, exploiting cloud vulnerabilities and weak credentials for extensive data exfiltration.
Number of Active Ransomware Groups Highest on Record
The rise in active ransomware groups has increased risks for businesses, highlighting the need for robust cybersecurity measures.
Flying Under the Radar - Security Evasion Techniques
Phishing attacks have evolved from simple scams to sophisticated techniques that challenge modern security measures.
VMware ESXi flaw leveraged by BlackByte ransomware
BlackByte ransomware group is evolving tactics, exploiting VMware vulnerability to compromise enterprise infrastructure and evade detection.
Schools under siege: from nation-states to ransomware gangs
Education institutions are critical targets for cybercriminals due to their handling of sensitive information and their lack of resources to defend against attacks.
New Loader Masquerades as Antivirus to Deliver SSLoad
PhantomLoader uses advanced evasion techniques to deliver SSLoad malware, posing significant threats to systems through phishing and deception.
Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
Storm-0501 targets U.S. sectors for ransomware attacks, exploiting cloud vulnerabilities and weak credentials for extensive data exfiltration.
Number of Active Ransomware Groups Highest on Record
The rise in active ransomware groups has increased risks for businesses, highlighting the need for robust cybersecurity measures.
Flying Under the Radar - Security Evasion Techniques
Phishing attacks have evolved from simple scams to sophisticated techniques that challenge modern security measures.
VMware ESXi flaw leveraged by BlackByte ransomware
BlackByte ransomware group is evolving tactics, exploiting VMware vulnerability to compromise enterprise infrastructure and evade detection.
Schools under siege: from nation-states to ransomware gangs
Education institutions are critical targets for cybercriminals due to their handling of sensitive information and their lack of resources to defend against attacks.
New Loader Masquerades as Antivirus to Deliver SSLoad
PhantomLoader uses advanced evasion techniques to deliver SSLoad malware, posing significant threats to systems through phishing and deception.
Google says Iranian hackers are trying to access emails of Harris and Trump
Iranian cyber intrusion efforts are intensifying as the U.S. presidential election approaches, targeting notable political figures.
AI is responsible for 40% of business email compromise (BEC) emails
The Q2 2024 Email Threat Trends Report by VIPRE Security Group highlights the prevalence of AI-generated BEC attacks, urging the adoption of advanced threat detection solutions and security awareness training.
OpenSSF launch Siren for Open Source Threat Intelligence
OpenSSF launched Siren to share threat intelligence for open source projects like corporate TIPs, filling a critical gap in underserved communities.
Enhanced Security for Enterprises: Google Launches Google Threat Intelligence
Google Cloud introduced Google Threat Intelligence at RSA Conference, offering comprehensive security features for large organizations.
Digital Element Named Winner of the Coveted Global InfoSec Awards
IP geolocation analytics are crucial in the complex cybersecurity landscape, aiding in robust security solutions.
Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies | TechRepublic
Cyber threat hunting aims to detect malicious activities and enhance an organization's resilience against attacks.
Hypothesis-driven hunting involves forming assumptions based on threat intelligence to uncover potential security breaches.
Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7
Ransomware threats in Asia-Pacific vary by jurisdiction and sector
Intelligence on specific attack trends can enhance ransomware defense
Scattered Spider chooses RansomHub, Qilin for latest attacks
Scattered Spider cybercrime group shift to RansomHub and Qilin ransomware showcases evolving tactics and power dynamics in hacking groups.
The first attempt to replace SORBS didn't take long
Data443 stepping in to provide free spam blocklist service for former SORBS users.