Endpoint security | Quick Read
All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.
Cybersecurity News | Quick Read
South Asian Governments Targeted by Bitter APT Group
Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.
Cybersecurity News | Quick Read
Nerbian RAT Malware, New Threat on the Market
The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.
Cybersecurity News | Quick Read
Hackers Are Going After Managed Security Providers
According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.
Cybersecurity News | Quick Read
New Phishing-as-a-Service Toolkit Discovered
Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.
Cybersecurity News | Quick Read
Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks
Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.
Cybersecurity News | Quick Read
Don’t Underestimate the DCRat Malware!
Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.
Cybersecurity News | Quick Read
Critical F5 BIG-IP Vulnerability Exploited by Hackers
Several F5 BIG-IP Modules Are Impacted.
Cybersecurity News | Quick Read
Lincoln College to Close Following Ransomware Attack
The Institution Will Suspend All Academic Activities at the Conclusion of the Spring Semester.
Cybersecurity News | Quick Read
National Emergency Declared by Costa Rica Following Conti Cyberattacks
Conti’s Operations Go On!
Cybersecurity News | Quick Read
Information Leading to the Arrest of Conti Ransomware Co-Conspirators to be Rewarded
The US Department of State Will Pay up to $10 Million for Information on Key Members of the Infamous Conti Cybercrime Gang.
Cybersecurity News | Quick Read
Caramel Credit Card Theft Is Becoming Increasingly Popular
Beware of Financial Fraud!
Cybersecurity News | Quick Read
NIST Releases Advisory Guide on Supply Chain Attack Protection
NIST’s New Recommendations on Supply Chain Attack Prevention
Cybersecurity News | Quick Read
Windows Installer Used by New Raspberry Robin Worm
The Worm Creates a New Process that Uses cmd.exe to Run Malicious Files.
Cybersecurity News | Quick Read
Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).
Naikon M.O. and TTPs
Cybersecurity Basics | Quick Read
Vendor Email Compromise (VEC) Explained
Definition, How VEC Attacks Work and Protective Measures.
Cybersecurity News | Quick Read
UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins
Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.
Cybersecurity News | Quick Read
BIG-IP RCE Bug Could Allow Device Takeover
Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.
Cybersecurity News | Quick Read
Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks
In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.
Cybersecurity News | Quick Read
Transport for NSW Suffers Cyber Incident
Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.
Security alerts | Quick Read
Botnet StealthWorker – M.O, Infectious Mechanism(s), and Distribution.
Cybersecurity News | Quick Read
Hacking Group Moshen Dragon Targets Asian Telecommunication Companies
The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.
Cybersecurity News | Quick Read
Threat Actors Sent Malicious Emails Using Google SMTP Relay Service
In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.
Cybersecurity News | Quick Read
REvil Ransomware Makes a Comeback
The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.
Cybersecurity News | Quick Read
Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards
User Security and Privacy Not a Priority for these Types of Apps.
Cybersecurity News | Quick Read
Conti’s BazarLoader Replaced with Bumblebee Malware
Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.
Cybersecurity News | Quick Read
EmoCheck Tool 2.2 Supports and Detects New 64-bit Variants of Emotet Malware
How to Verify if You Are Infected with Emotet Trojan.
Cybersecurity News | Quick Read
Medical Software Company Fined €1.5M for Exposing 490k Patients' Data
Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats