data
-
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Email Security / Cyber Threat Microsoft is urging customers to keep their Exchange servers updated as well as take steps…
Read More » -
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its…
Read More » -
Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
Cyber Threat / Cyber War Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of…
Read More » -
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
Endpoint Security / Malware Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB…
Read More » -
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
Malware Analyzing Orcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and…
Read More » -
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
Nation-State-Sponsored Attacks The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by Russian and Iranian…
Read More » -
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
Encryption / Ransomware The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated…
Read More » -
Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA
Encryption / Windows Security Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows CryptoAPI…
Read More » -
Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group
New research has linked the operations of a politically motivated hacktivist group known as Moses Staff to another nascent threat…
Read More » -
Is Once-Yearly Pen Testing Enough for Your Organization?
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a…
Read More »