Home Search
ransomware - search results
If you're not happy with the results, please do another search
Ransomhub Attacking Industrial Control Systems To Encrypt And Exfiltrate Data
Ransomhub, a new ransomware group, has targeted the SCADA system of a Spanish bioenergy plant, Matadero de Gijón, which highlights the critical security risks...
Sharp Dragon Hackers Attacking Government Entities Using Cobalt Strike & Custom Backdoors
The activities of the Chinese threat actor group known as Sharp Dragon (formerly Sharp Panda) have been meticulously documented.
Since 2021, this group has...
Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys
A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including, Microsoft Azure, MongoDB, and GitHub.
The...
Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation...
Memcyco Inc., a provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State...
Void Manticore Attacking Organizations with Destructive Wiper Malwares
Hackers exploit wipers and ransomware as tools for bringing organizations down since these tools can cause huge disruption and damage in large numbers.
Wipers can...
CasperSecurity Stealer Attacking Windows Machine to Steal RDP Credentials
A new piece of malware called CasperSecurity Stealer is a major threat to Windows computers.
This complex malware is made to steal Remote Desktop...
Samstealer Attacking Windows Systems To Steal Sensitive Data
Hackers mainly aim at Windows systems as they are widely adopted and dominate the market, consequently, threat actors will achieve maximum financial gain or...
Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)
The latest threats, vulnerabilities, data breaches, and defensive countermeasures are covered in the weekly cybersecurity news recap.
In order to enhance your security posture and...
LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!
Hackers use loaders to bypass security measures and run harmful code in a genuine process's memory themselves.
This makes it possible for malware payloads to...
Best Practices for Deploying and Managing Endpoint Management Software
Endpoint management software plays a crucial role in ensuring the security and efficiency of an organization's network. As technology advances and threats become more...