Decrypting Hive Ransomware Data
March 1 2022Nice piece of research:
Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As...
Read more
Nice piece of research:
Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As...
Read more
The Great Resignation strikes cybersecurity teams too. Here's a checklist for CISOs to ensure security is retained even as security staff is not.
Read moreToyota suspends production at all 14 plants in Japan after a supplier reported being hit by "some kind of cyberattack."
Read moreReport examines the prevalence of two common insecure practices.
Read moreThe Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and...
Read moreInvicti SCA enables users to track and secure open-source components to reduce security risk.
Read moreBelarus-based APT behind the attacks may also be working in concert with Russia, researchers say.
Read moreInstagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...
Read moreA stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data...
Read moreResearchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.
Read more
Recent Comments