SIEM as a Service
Home Search

ransomware - search results

If you're not happy with the results, please do another search
Ransomhub Attacking Industrial Control Systems To Encrypt And Exfiltrate Data

Ransomhub Attacking Industrial Control Systems To Encrypt And Exfiltrate Data

Ransomhub, a new ransomware group, has targeted the SCADA system of a Spanish bioenergy plant, Matadero de Gijón, which highlights the critical security risks...
Sharp Dragon Hackers Attacking Government Entities Using Cobalt Strike & Custom Backdoors

Sharp Dragon Hackers Attacking Government Entities Using Cobalt Strike & Custom Backdoors

The activities of the Chinese threat actor group known as Sharp Dragon (formerly Sharp Panda) have been meticulously documented. Since 2021, this group has...
Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys

Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys

A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including, Microsoft Azure, MongoDB, and GitHub. The...
Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation...

Memcyco Inc., a provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State...
Void Manticore Attacking Organizations with Destructive Attacks Using Wiper Malware

Void Manticore Attacking Organizations with Destructive Wiper Malwares

Hackers exploit wipers and ransomware as tools for bringing organizations down since these tools can cause huge disruption and damage in large numbers.  Wipers can...
CasperSecurity Stealer Attacking Windows Machine to Remote Desktop Credentials

CasperSecurity Stealer Attacking Windows Machine to Steal RDP Credentials

A new piece of malware called CasperSecurity Stealer is a major threat to Windows computers. This complex malware is made to steal Remote Desktop...
Samstealer Attacking Windows Systems To Steal Sensitive Data

Samstealer Attacking Windows Systems To Steal Sensitive Data

Hackers mainly aim at Windows systems as they are widely adopted and dominate the market, consequently, threat actors will achieve maximum financial gain or...
Cyber Security News Weekly Round-Up

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

The latest threats, vulnerabilities, data breaches, and defensive countermeasures are covered in the weekly cybersecurity news recap.  In order to enhance your security posture and...
LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!

LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!

Hackers use loaders to bypass security measures and run harmful code in a genuine process's memory themselves.  This makes it possible for malware payloads to...
Best Practices for Deploying and Managing Endpoint Management Software

Best Practices for Deploying and Managing Endpoint Management Software

Endpoint management software plays a crucial role in ensuring the security and efficiency of an organization's network. As technology advances and threats become more...
SIEM as a Service

Recent Posts

Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer

A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The attack leverages exposed instances of Jupyter...