Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems
September 13 2022The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.
Read moreLorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems
September 13 2022The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.
Read moreBusiness Security Starts With Identity
September 13 2022How identity-centric security can support business objectives.
Read moreAttackers Can Compromise Most Cloud Data in Just 3 Steps
September 13 2022An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.
Read moreAttackers Can Compromise Most Cloud Data in Just 3 Steps
September 13 2022An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.
Read moreFBI Seizes Stolen Cryptocurrencies
September 13 2022The Wall Street Journal is reporting that the FBI has recovered over $30 million in cryptocurrency stolen by North Korean hackers earlier this year. It’s only a fraction...
Read moreHow Machine Learning Can Boost Network Visibility for OT Teams
September 12 2022Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.
Read more
Recent Comments