SIEM as a Service
Home Search

ransomware - search results

If you're not happy with the results, please do another search

How can Businesses Ensure Their Cybersecurity Measures are Adequate?

Nowadays, cyber attacks are more common and more frequent, especially targeting small businesses that may or may not have proper security measures in place....
Intel Boot Guard Private Keys

MSI CyberAttack – Intel Boot Guard Private Keys Leaked on the Dark Web

The private code signing keys for the multinational Taiwanese technology business Micro-Star International (MSI) Co., Ltd. have been made public on a dark website...
What is Digital Forensics?

What is Digital Forensics? Tools, Types, Phases & History

A subfield of forensic science called digital forensics focuses on finding, obtaining, processing, analyzing, and documenting electronically stored data. Digital forensics support is essential for...
Crowdsourced YARA Hub

VirusTotal New “Crowdsourced YARA Hub” Let Security Researchers Filter Yara Rules

VirusTotal has introduced a Crowdsourced YARA Hub to overcome this hurdle, letting users find and filter existing rules, track a new rule, and export...
BouldSpy Malware

‘BouldSpy’ Android Malware Used by Iranian Government for Surveillance Operations

New Android spyware, BouldSpy detected recently by Lookout Threat Lab, linked with moderate certainty to Iran's Law Enforcement Command of the Islamic Republic of...

Best Practices to Reduce the Threats of Cyberattacks

Today's online environment is a virtual minefield where explosions might happen at any time. Cyberattacks are always lurking in the dark of the internet,...
SaaS cybersecurity threats

Top 13 SaaS Cybersecurity Threats in 2023

Every company should have an eye on its cybersecurity. =But SaaS companies have their own set of concerns to be mindful of. With their...
Scan Linux Servers

10 Best Linux Vulnerability Scanners to Scan Linux Servers – 2024

Introduction : Are you searching for Linux Vulnerability scanners that can recognize, characterize, and categorize to Scan Linux Servers, etc? Regarding the security holes, this article...
Ghosttoken - Zero-Day

Ghosttoken – Zero-Day Flaw Lets Attackers Gain Access to Google Accounts

Astrix's Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation. This method was termed...
Google Ads Deliver Bumblebee Malware

Hackers Use Google Ads to Deliver Bumblebee Malware

Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks' Counter Threat Unit (CTU) researchers reported that Cyber attackers are...
SIEM as a Service

Recent Posts