SIEM as a Service
Home Search

ransomware - search results

If you're not happy with the results, please do another search
20 Best Malware Protection Solutions in 2024

20 Best Malware Protection Solutions in 2024

Malware protection solutions combine Antivirus Software, Endpoint Protection Platforms (EPP), Anti-Malware Software, Next-Generation Antivirus (NGAV), Internet Security Suites, Network-based Malware Protection, and Browser Extensions...
Roundup of Threat and Vulnerability

Weekly Security News Round-up For Threats and Vulnerabilities: July 23rd to 29th

This week's Threat and Vulnerability Roundup is here! Cyber Writes pride ourselves in delivering a weekly roundup of the most up-to-date cybersecurity news. Our...
Hackers Stole Over 8 Million Users Data From U.S. Government Services Contractor

Hackers Stole Over 8 Million Users Data From U.S. Government Services Contractor

Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals' 'Users Data' protected health information. Maximus, a US government contracting...
Top Network Security Challenges in 2023

Top Network Security Challenges in 2023

In the ever-evolving digital landscape of 2023, the importance of network security has reached unprecedented heights. As technology progresses, cybercriminals also evolve their threats....
Hackers Use Fake Update page mimicking victim’s browser to deliver NetSupport RAT

Hackers Use Fake Update Page Mimicking Victim’s Browser to Deliver NetSupport RAT

Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display...
Using Web Scraping For Protection Against Cyber Attacks – A Complete Guide

Using Web Scraping For Protection Against Cyber Attacks – A Complete Guide

As our digital interactions increase, cybersecurity threats rise simultaneously. But what if the same tool cybercriminals use to breach secure systems could be used...
4 Common Threats A Web Application Firewall Can Prevent From Cyber Attack

4 Common Threats A Web Application Firewall Can Prevent From Cyber Attack

A Web Application Firewall (WAF) is a tool that filters the incoming and outgoing traffic at the application layer. Based on the pre-set rules by...
IT Security Analyst Jailed

IT Security Analyst Jailed for Impersonating as a Hacker in Own Company

A 28 years old Former IT security analyst of an Oxford-based company has been sentenced to three years for deceiving the company to extort...
Endpoint Security Best Practices

Securing Endpoints: 6 Best Practices to Eliminate Blind Spots

In today's age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of this, Endpoints are now...
Information Security Threats

Top Information Security Threats for Businesses 2023

Businesses face a myriad of information security risks that can be detrimental to their operations. Information security threats evolve rapidly, and new threats may...
SIEM as a Service

Recent Posts

Monitoring Dark Web Threats

Monitoring Dark Web Threats – CISO’s Proactive Approach

The dark web has rapidly become a central hub for cybercriminal activity, where stolen data, compromised credentials, and malicious tools are traded with alarming...