Ransomware Review February 2024
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
In late January 2024, the ThreatDown Managed Detection and Response (MDR) team found and stopped a three-month long malware campaign...
Exploit in the wild has been detected for CVE-2024-21410, affecting Microsoft Exchange Server. The vulnerability could be exploited by sending...
Apple has released security updates to address a high-severity vulnerability (CVE-2024-23204) affecting their Shortcuts app in their products.The Apple Shortcuts...
Japan's Computer Security Incident Response Team (JPCERT/CC) is warning that the notorious North Korean hacking group Lazarus has uploaded four...
Image: Midjourney A threat actor named Savvy Seahorse is abusing CNAME DNS records Domain Name System to create a traffic...
Kali Linux has released version 2024.1, the first version of 2024, with four new tools, a theme refresh, and desktop...
U.S. President Joe Biden has signed an executive order that aims to ban the bulk sale and transfer of Americans'...
North Korean threat actors known as the Lazarus Group exploited a flaw in the Windows AppLocker driver (appid.sys) as a...
At least 100 instances of malicious AI ML models were found on the Hugging Face platform, some of which can...
The Rhysida ransomware gang has claimed the cyberattack on Lurie Children's Hospital in Chicago at the start of the month....
These days, cyber threat actors continue to rely just as much on psychological manipulation in the form of convincing phishing...
Epic Games said they found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to...
Image: Midjourney The BlackCat/ALPHV ransomware gang has officially claimed responsibility for a cyberattack on Optum, a subsidiary of UnitedHealth Group...
Image: Midjourney According to a wave of online reports from Anycubic customers, someone hacked their 3D printers to warn that...
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after...
Security researchers have warned that threat actors are increasingly turning to zero-day exploits to increase the success rate of advanced...
The UK's top Information Commissioner has confirmed safeguarding consumer rights in the era of artificial intelligence (AI) is a top...
A majority (54%) of UK business decision makers are concerned about the likelihood of their employees being approached by cybercriminals,...
A joint Cybersecurity Advisory (CSA) issued by the Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command...
The UK Department for Science, Innovation and Technology (DSIT) has revealed what its future Cybersecurity Governance Code of Practice will...
This is part one of a two-part series on advancing digital trust in a security context.The term “digital trust” has...