The malware is one of the most sophisticated ransomwares ever seen in the wild, and marks a leap ahead for cybercrime.
Read moreScans of the Internet find that millions of computers, virtual machines, and containers are vulnerable to one or more of the hundreds of cyberattacks currently used in the wild,...
Read moreWhat RASP Should Have Been
April 5 2023When runtime application self-protection is held to a higher standard, it can secure thousands of applications and prevent burnout in security teams.
Read moreImagine tiling a whole football field using a single shape... yet not being able to produce a repeating pattern, even if you wanted to.
Read moreCybersecurity startups face pressure during this economic uncertainty, but strategic investors can help them succeed in providing tech that defends against cyberattacks.
Read moreHave you ever wondered how they design blue team exercises? One ransomware and cyber extortion simulation demonstrates the best practices.
Read moreCybercriminals Can Earn Potentially $200K Monthly by Exploiting Log4J in Proxyjacking Attacks
April 4 2023Proxyjacking is an emerging, low-effort and high-reward attack for threat actors, with the potential for far-reaching implications.
Read moreAuthorities claw back funds from six crypto accounts they say were linked to a "pig-butchering" cybercrime ring.
Read more"Gopuram" is a backdoor that North Korea's Lazarus Group has used in some campaigns dating back to 2020, some researchers say.
Read more
Recent Comments