Home Search

ID Ransomware - search results

If you're not happy with the results, please do another search
data breach

Lessons From The 1,802 Data Breaches Of 2022: A Deeper Dive Into Internet Safety

The year 2022 has been a wake-up call for the digital world. A staggering 1,802 data compromises were reported globally, affecting 422 million individuals,...

DarkBERT: A New AI Trained Exclusively on the Dark Web

South Korean researchers (Youngjin Jin, Eugene Jang, Jian Cui, Jin-Woo Chung, Yongjae Lee, Seungwon Shin) at KAIST (Korea Advanced Institute of Science & Technology)...
PharMerica Hacked – Over 5 million Patients record stolen

PharMerica Hacked – Over 5 million Patients record stolen

Reports indicate that PharMerica Healthcare has faced a data breach resulting in 5.8 million records being exposed. PharMerica is one of the Fortune 1000 companies...
Mobile Endpoints

6 Ways you can Proactively Secure Your organization’s Mobile Endpoints

Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices...
Fake QuickBooks Software

Hackers Use Fake QuickBooks Software to Gain Remote Session on the Victim’s Machine

eSentire TRU (Threat Response Unit) has recently discovered a scamming activity conducted via a fake QuickBooks installer that sends a warning message indicating technical...
Dragos Cyberattack – Hackers Contacted Firm CEO’s Son, Wife in Extortion Attempt

Dragos Cyber Attack – Hackers Contacted Firm CEO’s Son, Wife in Extortion Attempt

A cybercriminal group obtained contracts from cybersecurity firm Dragos Inc. as part of an extortion attempt that involved contacting the chief executive officer's wife and...
C2 Infrastructure Ursnif

Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif

Bridewell's Cyber Threat Intelligence (CTI) team has discovered previously undetected Ursnif infrastructure used in 2023 campaigns, suggesting that the malware operators have not yet...
Phishing-as-a-Service Tool

New Phishing-as-a-Service Tool Used in the Wild to Target Organizations

The cybersecurity researchers at Cisco Talos recently affirmed that threat actors are targeting the widely-used Microsoft 365 cloud-based productivity platform through the Greatness phishing...

How can Businesses Ensure Their Cybersecurity Measures are Adequate?

Nowadays, cyber attacks are more common and more frequent, especially targeting small businesses that may or may not have proper security measures in place....
Intel Boot Guard Private Keys

MSI CyberAttack – Intel Boot Guard Private Keys Leaked on the Dark Web

The private code signing keys for the multinational Taiwanese technology business Micro-Star International (MSI) Co., Ltd. have been made public on a dark website...

Managed WAF


Latest News