Cyber Crime
Active Directory Infiltration Methods Employed by Cybercriminals – ASEC Report
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft's Active Directory to gain unauthorized access.Active Directory is a central component in many organizations,...
Botnet
Dark Effects of Bot Attacks that Drive 73% of Internet Traffic
Bot Abuse Analysis and Other Fraud Benchmarks report by Arkose Labs provides a comprehensive analysis of bot abuse trends and fraud benchmarks. The report...
Cyber Crime
Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People
Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging to more than four...
Cyber Crime
Admin of E-Root Marketplace was Arrested for RDP & SSH Passwords
Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering the E-Root Marketplace.This...
Cyber Crime
The Rise of Automotive Hacking: How to Secure Your Vehicles Against Hacking
Though we can’t see it, the world brims with more technology than ever. These days, devices with internet connectivity live within the ever-growing Internet...
Artificial Intelligence
Hackers Are Using AI For Cyberattacks. How Can We Stop Them?
The use of AI has greatly increased over the past few months, with programs like ChatGPT and Bing AI making the technology freely available...
Cyber Crime
Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks
The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge in digital insecurity and...
Checklist
Building a Network Security Strategy: Complete Checklist To Protect Your Network
Whether you’re a large or small business, network security is something you can’t ignore.Threat actors can and will, infiltrate businesses of any size wreaking...