tools
-
Some Worms Use Their Powers for Good
Gardeners know that worms are good. Cybersecurity professionals know that worms are bad. Very bad. In fact, worms are literally…
Read More » -
New ‘SessionManager’ Backdoor Targeting Microsoft IIS Servers in the Wild
A newly discovered malware has been put to use in the wild at least since March 2021 to backdoor Microsoft…
Read More » -
Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement…
Read More » -
New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators
Cybersecurity researchers have documented a new information-stealing malware that targets YouTube content creators by plundering their authentication cookies. Dubbed “YTStealer”…
Read More » -
Cybersecurity Experts Warn of Emerging Threat of “Black Basta” Ransomware
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New…
Read More » -
What Are Shadow IDs, and How Are They Crucial in 2022?
Just before last Christmas, in a first-of-a-kind case, JPMorgan was fined $200M for employees using non-sanctioned applications for communicating about…
Read More » -
Italy Data Protection Authority Warns Websites Against Use of Google Analytics
Following the footsteps of Austria and France, the Italian Data Protection Authority has become the latest regulator to find the…
Read More » -
Manual vs. SSPM: Research on What Streamlines SaaS Security Detection & Remediation
When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline the detection…
Read More » -
BRATA Android Malware Gains Advanced Mobile Threat Capabilities
The operators behind BRATA have once again added more capabilities to the Android mobile malware in an attempt to make…
Read More »