New Ransomware Group Exploiting Veeam Backup Software Vulnerability
Jul 10, 2024NewsroomData Breach / Malware A now-patched security flaw in Veeam…
5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy
Jul 08, 2024The Hacker NewsCybersecurity / Enterprise Security Events like the recent…
Learn How ITDR Solutions Stop Sophisticated Identity Attacks
Jul 05, 2024The Hacker NewsCybersecurity / Identity Protection Identity theft isn't just…
GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks
Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack, The malware known as GootLoader…
How MFA Failures are Fueling a 500% Surge in Ransomware Losses
The cybersecurity threat landscape has witnessed a dramatic and alarming rise in…
How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren't protecting the…
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured…
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
Jun 26, 2024NewsroomCyber Attack / Malware Threat actors with suspected ties to…
New MOVEit Transfer Vulnerability Under Active Exploitation
Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw…