Search Results for: victim information Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government... Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post AI Isn’t Good Enough When Lives Are on the Line, Experts Warn. June 4, 2019 During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation... Blog Post The Growing Importance of Bio-Cybersecurity June 4, 2019 The Growing Importance of Bio-Cybersecurity What is cyberbiosecurity? Cyberbiosecurity is a new specialty at understanding and mitigating new biological security... Blog Post Quest Diagnostics says 11.9 million patients affected by data breach June 3, 2019 Medical testing giant Quest Diagnostics has confirmed a third-party billing company has been hit by a data breach affecting 11.9... Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming... Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the... Blog Post U.S. Offering $10 million to Track Down Darkside Leadership December 10, 2021 On November 4th, the U.S. government announced a reward of up to $10 million for any information that could lead... Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response... Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative... Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government...
Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post AI Isn’t Good Enough When Lives Are on the Line, Experts Warn. June 4, 2019 During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation...
Blog Post The Growing Importance of Bio-Cybersecurity June 4, 2019 The Growing Importance of Bio-Cybersecurity What is cyberbiosecurity? Cyberbiosecurity is a new specialty at understanding and mitigating new biological security...
Blog Post Quest Diagnostics says 11.9 million patients affected by data breach June 3, 2019 Medical testing giant Quest Diagnostics has confirmed a third-party billing company has been hit by a data breach affecting 11.9...
Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming...
Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the...
Blog Post U.S. Offering $10 million to Track Down Darkside Leadership December 10, 2021 On November 4th, the U.S. government announced a reward of up to $10 million for any information that could lead...
Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative...
Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...