Cybersecurity News | Quick Read
The Tenet Case: Are Hackers Targeting the Healthcare Industry?
How Healthcare Can Stay Safe in this Cybersecurity Landscape.
Forensics and threat hunting | Quick Read
Threat-Hunting Journal April 2022 – Easter Edition
Top Malware(s) Detections: 1st of April – 28th of April
Cybersecurity News | Quick Read
Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms
15 Common Flaws of Last Year Now Put Together in a List.
Cybersecurity News | Quick Read
The Nimbuspwn Linux Flaw Allows Root Access
Local Attackers Could Use Nimbuspwn to Escalate Privileges on Linux Systems.
Cybersecurity News | Quick Read
Coca-Cola Investigates Hacker Data Theft Allegations
The Stormous Gang Claimed to Have Hacked into the Company’s Servers.
Cybersecurity News | Quick Read
Cyber Reporting: New Legislation Impacts US Banks
What Are the New Rules?
Cybersecurity interviews | Quick Read
How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview
CEO Morten Kjærsgaard Shared His View on the Cybersecurity Industry through the Russia vs. Ukraine Conflict.
Cybersecurity News | Quick Read
The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says
Threat Actors Might Take Advantage of the Harvest Season.
Cybersecurity News | Quick Read
Microsoft Exchange Servers Targeted by Hive Ransomware
The Attack Explained.
Access Management | Quick Read
Authentication vs. Authorization: the Difference Explained
Authentication and Authorization Concepts. Authentication & Authorization Methods.
Cybersecurity News | Quick Read
REvil's TOR Sites Are Back With New Ransomware
The Servers Have Returned to Service After Months of Inactivity.
Cybersecurity News | Quick Read
Emotet Botnet Grows in Size and Activity
The Malware May Soon Switch to New Payloads That Are Caught by Fewer Antivirus Engines.
Cybersecurity News | Quick Read
Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities
If Abused, Hackers Could Deploy and Run Firmware Implants.
Cybersecurity News | Quick Read
A Zero-Click Vulnerability Is Exploited by NSO Spyware
The New Zero-Click iMessage Vulnerability May be Used to Install the Malware on iPhones.
Cybersecurity News | Quick Read
Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns
The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.
Cybersecurity News | Quick Read
IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government
Threat Actors Are Exploiting a Zimbra Vulnerability in the Second Stage of the Cyberattacks.
Cybersecurity News | Quick Read
Industrial Spy, a New Stolen Data Market Is Advertised via Adware and Cracks
How Much for a Big Company’s Data?
Cybersecurity News | Quick Read
ZingoStealer: New Malware Making Way on the Threat Landscape
ZingoStealer Has the Capacity to Propagate Crypto-Mining Malware.
Cybersecurity News | Quick Read
Nordex Hit by Conti Ransomware
The Wind Turbine Developer Had to Shut Down Its IT Systems in Order to Prevent the Spread of the Attack.
Cybersecurity News | Quick Read
Payment App Users Targeted in Phishing and Social Engineering Campaigns, FBI Warns
How to Avoid Falling Victim to Scammers.
Cybersecurity News | Quick Read
RemcosRAT Malware Is Targeting African Banks
The Malware Distribution Campaign Employs HTML Smuggling Strategies as Well as Typo-Squatting to Spread Its Software.
Cybersecurity News | Quick Read
Hospital Robots Have Been Found to Have Critical Vulnerabilities
Researchers Named the Flaws Jekyllbot:5.
Cybersecurity News | Quick Read
New Fodcha DDoS Malware Targets More than 100 Victims Daily
The Botnet Spreads via Brute-force Attacks and Exploits.
Cybersecurity News | Quick Read
SharkBot Is Spread Using Phony Antivirus Apps on Google Play
An Info-Stealer Now Targeting Android Devices.
Cybersecurity News | Quick Read
Hacking Forum RaidForums Shut Down
The Forum’s Founder Was Arrested.
Cybersecurity News | Quick Read
Millions of Endpoints Affected by Critical HP Teradici PCoIP Vulnerabilities
What Should Users Do?
Cybersecurity News | Quick Read
Mirai Malware Distributed by Means of Spring4Shell Vulnerability
A Flaw in Spring Framework Lets Hackers Download the Mirai Botnet.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats