ransomware

Cybercriminals Hide Undetectable Ransomware Inside JPG ImagesCybercriminals Hide Undetectable Ransomware Inside JPG Images

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

5 days ago
DragonForce Ransomware Targets Major UK Retailers, Including Harrods, Marks & Spencer, and Co-OpDragonForce Ransomware Targets Major UK Retailers, Including Harrods, Marks & Spencer, and Co-Op

DragonForce Ransomware Targets Major UK Retailers, Including Harrods, Marks & Spencer, and Co-Op

Major UK retailers including Harrods, Marks and Spencer, and Co-Op are currently experiencing significant service disruptions following a series of…

2 weeks ago
UK Retail Chains Targeted by Ransomware Attackers Claiming Data TheftUK Retail Chains Targeted by Ransomware Attackers Claiming Data Theft

UK Retail Chains Targeted by Ransomware Attackers Claiming Data Theft

Major ransomware campaign targeting UK retailers has escalated as hackers provided BBC News with evidence of extensive network infiltration and…

2 weeks ago
Researchers Uncovered RansomHub Operation and it’s Relation With Qilin RansomwareResearchers Uncovered RansomHub Operation and it’s Relation With Qilin Ransomware

Researchers Uncovered RansomHub Operation and it’s Relation With Qilin Ransomware

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…

2 weeks ago
How SMBs Can Improve SOC Maturity With Limited ResourcesHow SMBs Can Improve SOC Maturity With Limited Resources

How SMBs Can Improve SOC Maturity With Limited Resources

Small and Medium-sized Businesses (SMBs) have become prime targets for cybercriminals, being three times more likely to be targeted by…

4 weeks ago
How To Detect Obfuscated Malware That Evades Static Analysis ToolsHow To Detect Obfuscated Malware That Evades Static Analysis Tools

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components…

4 weeks ago
How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise NetworksHow Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System…

4 weeks ago
Defending Against Web API Exploitation With Modern Detection StrategiesDefending Against Web API Exploitation With Modern Detection Strategies

Defending Against Web API Exploitation With Modern Detection Strategies

In today's interconnected digital landscape, APIs serve as the critical building blocks of modern web applications, enabling seamless data exchange…

4 weeks ago
How To Integrate MITRE ATT&CK Into Your SOC For Better Threat VisibilityHow To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility

How To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility

The evolving cybersecurity landscape demands advanced strategies to counter sophisticated threats that outpace traditional security measures. The MITRE ATT&CK framework…

4 weeks ago
Harvest Ransomware Attack: Stolen Data Now Publicly DisclosedHarvest Ransomware Attack: Stolen Data Now Publicly Disclosed

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public…

1 month ago