Home Search
Ransomware - search results
If you're not happy with the results, please do another search
Webwyrm Malware Affects More Than 100,000 Users in 50 Countries
Threat actors are evolving their Tactics, Techniques, and Procedures (TTPs) at an alarming rate.
With technological advancements and increased awareness of cybersecurity measures, they continually...
OpenAI is Reportedly Developing its Own AI chips
The maker of ChatGPT, OpenAI, is looking at making its own artificial intelligence chips, which are necessary for operating the highly popular chatbot.
Those acquainted...
MGM Resorts Refused to Pay Hackers’ Ransom Demand in Cyberattack
In recent news, MGM Resorts International took a bold stance in the face of a cyberattack, refusing to give in to ransomware hackers who...
GoldDigger Disguises as Fake Android App To Steal Banking Credentials
GoldDigger, a new Android Trojan, imitates a fraudulent Android application and has been discovered to spoof both a Vietnamese government portal and a local...
Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks
Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to cyberattacks through cleverly crafted...
Why Choose When You Can Have Both? IT Management OR IT security
Forget about security versus productivity! The tug-of-war between management and security solutions to coexist in a single endpoint is the next big thing. But...
Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User
Cisco was reported with a critical vulnerability that could allow threat actors to log in to the affected devices as a root account. The...
Zero-Day WhatsApp Hacking Vulnerabilities Worth Millions
Securing the devices running iOS and Android operating systems is now costly due to improved defenses.
According to a recent report by TechCrunch, there has...
Supershell – Open-Source Botnet That Obtain SSH Shell Access
The digital age offers opportunities but also increases the importance of cybersecurity as threats grow in complexity and sophistication, making preparedness a top priority.
Open-source...
Threat Actors Deployed Hundreds of Python Packages to Steal System Data
In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has been evolving and sharpening...