Thursday, December 7, 2023
Home Search

ransomware campaign - search results

If you're not happy with the results, please do another search

Bumblebee Malware Abuses WebDAV Protocol to Attack Organizations

0
In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat to organizations' digital security. This...

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

0
In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases.Telecom firms with critical infrastructure...

Iranian Hackers Attack Thousands of Organizations Using Password Spraying

0
Peach Sandstorm, an Iranian Hackers group that targets organizations globally, aligns with the following threat groups:-APT33ElfinRefined KittenBesides this, in the following sectors, the Iranian...

Next-Gen Email Firewalls: Beyond Spam Filters to Secure Inboxes Checklist

0
Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats.The vast number of people who use it...

Microsoft Teams as a Tool for Storm-0324 Threat Group to Hack Corporate Networks

0
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.However, as of July...

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

0
A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive Messenger phishing campaign on...

Beware of Fake Browser Updates that Install Malware on Systems

0
In recent times, it's been observed that fake malware-loaded browser updates are gaining rapid growth in the threat landscape.Rapid7 researchers recently identified a Fake...

Unveiling the Dangers of Crypto Extortion and Steps to Shield Your Enterprise

0
The age-old detective mantra, "Follow the money," remains relevant in solving crimes, although it gets a bit tricky when dealing with cybercrime. This is...

Email Authentication Protocols: SPF, DKIM, and DMARC – A Detailed Guide

0
Email communication is essential for personal and professional contact in the modern digital environment.Email is widely used, making it a perfect target for...

Stealthy Android Malware Attacking Mobile Users Via Fake App Stores

0
A recently discovered Android Trojan, dubbed "MMRat," poses a serious threat to mobile banking security. Unlike other forms of malware, this Trojan is designed...

Managed WAF protection

Website

Recent Articles