ransomware

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise NetworksHow Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System…

1 month ago
Defending Against Web API Exploitation With Modern Detection StrategiesDefending Against Web API Exploitation With Modern Detection Strategies

Defending Against Web API Exploitation With Modern Detection Strategies

In today's interconnected digital landscape, APIs serve as the critical building blocks of modern web applications, enabling seamless data exchange…

1 month ago
How To Integrate MITRE ATT&CK Into Your SOC For Better Threat VisibilityHow To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility

How To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility

The evolving cybersecurity landscape demands advanced strategies to counter sophisticated threats that outpace traditional security measures. The MITRE ATT&CK framework…

1 month ago
Harvest Ransomware Attack: Stolen Data Now Publicly DisclosedHarvest Ransomware Attack: Stolen Data Now Publicly Disclosed

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public…

1 month ago
NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate NetworksNetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

In the modern enterprise, network security teams face the daunting challenge of detecting and responding to multi-stage attacks that unfold…

2 months ago
DOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy AttacksDOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks

DOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks

A new and highly sophisticated ransomware campaign, dubbed “DOGE BIG BALLS Ransomware,” has recently come to light, demonstrating a blend…

2 months ago
Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M RansomKuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur International Airport (KLIA), one of Southeast Asia's busiest airports, was hit by a major cyberattack over the weekend.…

2 months ago
Malicious VS Code Extensions Target Developers with ShibaCoin RansomwareMalicious VS Code Extensions Target Developers with ShibaCoin Ransomware

Malicious VS Code Extensions Target Developers with ShibaCoin Ransomware

Researchers from Reversing Labs have identified two malicious Visual Studio Code (VS Code) extensions that are distributing ransomware to unsuspecting…

2 months ago
U.S. Charges LockBit Ransomware Developer in Cybercrime CrackdownU.S. Charges LockBit Ransomware Developer in Cybercrime Crackdown

U.S. Charges LockBit Ransomware Developer in Cybercrime Crackdown

The U.S. Department of Justice has charged Rostislav Panev, a dual Russian and Israeli national, for his role as a…

3 months ago
Decrypting Akira Ransomware on Linux/ESXi Without Paying HackersDecrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without succumbing to the hackers' demands. This…

3 months ago