Thursday, December 7, 2023
Home Search

ransomware campaign - search results

If you're not happy with the results, please do another search

Bumblebee Malware Abuses WebDAV Protocol to Attack Organizations

In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat to organizations' digital security. This...

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases.Telecom firms with critical infrastructure...

Iranian Hackers Attack Thousands of Organizations Using Password Spraying

Peach Sandstorm, an Iranian Hackers group that targets organizations globally, aligns with the following threat groups:-APT33ElfinRefined KittenBesides this, in the following sectors, the Iranian...

Next-Gen Email Firewalls: Beyond Spam Filters to Secure Inboxes Checklist

Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats.The vast number of people who use it...

Microsoft Teams as a Tool for Storm-0324 Threat Group to Hack Corporate Networks

According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.However, as of July...

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive Messenger phishing campaign on...

Beware of Fake Browser Updates that Install Malware on Systems

In recent times, it's been observed that fake malware-loaded browser updates are gaining rapid growth in the threat landscape.Rapid7 researchers recently identified a Fake...

Unveiling the Dangers of Crypto Extortion and Steps to Shield Your Enterprise

The age-old detective mantra, "Follow the money," remains relevant in solving crimes, although it gets a bit tricky when dealing with cybercrime. This is...

Email Authentication Protocols: SPF, DKIM, and DMARC – A Detailed Guide

Email communication is essential for personal and professional contact in the modern digital environment.Email is widely used, making it a perfect target for...

Stealthy Android Malware Attacking Mobile Users Via Fake App Stores

A recently discovered Android Trojan, dubbed "MMRat," poses a serious threat to mobile banking security. Unlike other forms of malware, this Trojan is designed...

Managed WAF protection


Recent Articles