Why data protection and privacy are not the same, and why that matters: Lock and Code S03E09
There’s a mistake commonly made in the United States that a law that was passed to help people move their...
There’s a mistake commonly made in the United States that a law that was passed to help people move their...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....
NB65 hacking group created its ransomware based on the leaked source code of the Conti ransomware and targets Russia. According...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Facebook/Meta said Russia-linked threat actors are attempting to use the social network against Ukraine with hate speech, bullying, and fake...
A massive DDoS attack took down Finnish government websites while Ukrainian President Zelenskyy addressed Finland’s members of parliament (MPs). On...
Experts discovered malicious Android apps on the Google Play Store masqueraded as antivirus solutions spreading the SharkBot Trojan. Researchers from the...
China-linked threat actors continue to target Indian power grid organizations, most of the attacks involved the ShadowPad backdoor. Recorded Future’s...
Experts warn of a Mirai-based botnet exploiting the recently discovered Spring4Shell vulnerability in attacks in the wild. Trend Micro Threat...
We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download...
This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions'...
Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are...
Some of the biggest stars around have seen content placed on their YouTube accounts without permission over the last couple...
The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses. This...
The US Department of Justice (DoJ) and Microsoft have taken the sting out of two operations believed to be controlled...
Ledger is one of the biggest hardware cryptocurrency wallets around and scammers have noticed. Phishing mails are in circulation, hoping...
A Ukrainian man was sentenced in the US to 5 years in prison for his criminal activity in the cybercrime...
Microsoft obtained a court order to take over seven domains used by the Russia-linked APT28 group to target Ukraine. Microsoft...
Hamas-linked threat actors conducted an elaborate campaign aimed at high-profile Israeli individuals employed in sensitive sectors. Researchers from Cybereason observed...
In early December 2021, a new ransomware actor started advertising its services on a Russian underground forum. They presented themselves...
Learn how to make your code run more efficiently in AWS Lambda, so you can save money and time! If...
Recently discovered malware loader Colibri leverages a trivial and efficient persistence mechanism to deploy Windows Vidar data stealer. Malwarebytes researchers...
Experts discovered a vulnerability, tracked as CVE-2022-22292, which can be exploited to compromise Android 9, 10, 11, and 12 devices....
Thanks to the Threat Intelligence team for their help with this article. Security researchers from Armorblox, a cybersecurity company specializing...