3AM Ransomware Attack – Stop Services & Delete Shadow Copies Before Encrypting
Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high.A new ransomware named 3AM has surfaced and...
MadPot: AWS Honeypot to Disrupt Threat Actors
In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the...
How To Prevent Ransomware Attacks More Successfully?
Ransomware is one of the most common cyber threats that attack both companies and private users. It works by encrypting your files, making them...
New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data
In recent years, personal data security has surged in importance due to digital device usage. Side-channel attacks exploit system side effects to gather information. Electronic...
Proofpoint Q2 Threat Report – Ransomware Returns, Growth in Social Engineering and Email Fraud
According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back...
North Korean and Chinese Hackers Attacking Healthcare Industries
Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign. Many Advanced Persistent Threat...
Five new malware programs are discovered every second
A new report from the respected independent testing agency AV-Test.org reveals some scary-sounding facts about the state of malware today.According to AV-Test.org, it has...
Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months
Cybersecurity researchers at Symantec's Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid...
What is Global Threat Intelligence? – SOC/DFIR Team Guide
Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide.Threats can originate anywhere,...
New Sponsor Malware Attacking Government & Healthcare Organizations
The Ballistic Bobcat is an Iran-aligned APT group, and initially, about two years ago, cybersecurity researchers at ESET tracked this threat group. Here below,...