corporate
-
New Evil PLC Attack Weaponizes PLCs to Breach OT and Enterprise Networks
Cybersecurity researchers have elaborated a novel attack technique that weaponizes programmable logic controllers (PLCs) to gain an initial foothold in…
Read More » -
What the Zola Hack Can Teach Us About Password Security
Password security is only as strong as the password itself. Unfortunately, we are often reminded of the danger of weak,…
Read More » -
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with…
Read More » -
Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers
The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims. “In the past,…
Read More » -
Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network
The decentralized file system solution known as IPFS is becoming the new “hotbed” for hosting phishing sites, researchers have warned.…
Read More » -
Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups
Google’s Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated…
Read More » -
What Are Shadow IDs, and How Are They Crucial in 2022?
Just before last Christmas, in a first-of-a-kind case, JPMorgan was fined $200M for employees using non-sanctioned applications for communicating about…
Read More » -
Mitigate Ransomware in a Remote-First World
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid…
Read More » -
Reimagine Hybrid Work: Same CyberSec in Office and at Home
It was first the pandemic that changed the usual state of work – before, it was commuting, working in the…
Read More »