Search Results for: compromised infrastructure Blog Post Lack of Corporate Firewalls Lead to The Rise In Malicious Device Activity April 30, 2020 According to the latest research, the number of organizations whose equipment has been damaged and forced to engage in malicious... Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet... Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach... Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a... Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Emotet takedown – The Most Feared Cybercrime-as-a-Service is Dead February 8, 2021 Law enforcement authorities of several European countries joined their effort in a coordinated action against Emotet. As a result, the... Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Blog Post Lack of Corporate Firewalls Lead to The Rise In Malicious Device Activity April 30, 2020 According to the latest research, the number of organizations whose equipment has been damaged and forced to engage in malicious...
Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet...
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach...
Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a...
Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Emotet takedown – The Most Feared Cybercrime-as-a-Service is Dead February 8, 2021 Law enforcement authorities of several European countries joined their effort in a coordinated action against Emotet. As a result, the...
Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The...
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...