Cybersecurity News | Quick Read
21 Billion Scam Calls Were Blocked by T-Mobile This Year
It Appears That an Average of 1.8 Billion Scam Calls Are Identified or Blocked Every Month.
Cybersecurity News | Quick Read
Meta Sues Threat Actors Responsible for the Phishing Scams Ran on Its Platforms
Over 39,000 Phony Websites Posing as Facebook, Messenger, WhatsApp, and Instagram Were Created by the Scammers.
Cybersecurity News | Quick Read
Zoho Zero-Day Exploited by State Threat Actors Since October, FBI Says
The Flaw Is Located in the Zoho’s ManageEngine Desktop Central Servers and Companies Are Advised to Apply the Existent Patch ASAP.
Cybersecurity News | Quick Read
Dridex Malware Installed With the Help of Log4j Vulnerability
The Log4j Vulnerability Is Apparently Being Used to Infect Windows Devices with the Dridex Trojan and Linux Devices with Meterpreter.
Cybersecurity News | Quick Read
The TellYouThePass Ransomware Reappeared After the Windows Log4j Attacks
The Vulnerability Is Used in Against Windows and Linux Devices Targeting a Critical Remote Code Execution Bug in the Apache Log4j Library.
Cybersecurity News | Quick Read
Spider-Man Fans, Watch Out! You Might Become the Next Victim in a New Phishing Campaign
Threat Actors Are Trying to Steal Their Banking Info via Phishing Links Based on the Newest Marvel Movie.
Cybersecurity News | Quick Read
The DarkWatchman Malware Was Found Hidden in Windows Registry
The New Malware It’s a Lightweight and Highly-Capable JavaScript RAT.
Cybersecurity News | Quick Read
Facebook Aka Meta Bans Seven Spy-For-Hire Entities
The Global Surveillance-for-Hire Industry Follows Intelligence Collection and Devices Compromising and Manipulation, Meta Says.
Access Management | Quick Read
Lenovo Laptops Vulnerable to Privilege Escalation Exploit
Users Urged to Upgrade to the Latest Available Version.
Patch management | Quick Read
Software Patching Statistics: Common Practices and Vulnerabilities
How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?
Cybersecurity News | Quick Read
Phorpiex Botnet Is Becoming Harder to Disrupt
The Botnet Re-emerged With New Peer-to-Peer Command and Control Infrastructure.
Cybersecurity News | Quick Read
Hive Ransomware Wreaked Havoc in Four Months: Hundreds of Organizations Breached
Hive Emerged in June and Has Been Working as a Ransomware-as-a-Service Program.
Cybersecurity News | Quick Read
Monero Miners Injected in Log4j Through RMI
Threat Actors Have Switched from LDAP Callback URLs to RMI in Order to Increase Their Chances of Success.
Cybersecurity News | Quick Read
London Classified Ads Site Gumtree Experiences Data Breach Due to F12 Key
The Leaked Data Contained Email Addresses, Postcodes, GPS Location, and Other Sensitive Info.
Cybersecurity News | Quick Read
The Log4j Vulnerability Is Now Used by State-Backed Hackers
The Threat Actors Are Linked to Governments in China, Iran, North Korea, and Turkey.
Cybersecurity News | Quick Read
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
The Study Shows the Necessity of E-mail Security Solutions.
Cybersecurity News | Quick Read
State-sponsored Threat Actors Steal Airline Data Using the Slack API
The Malicious Actor Behind the Attack Is Most Likely ITG17, Also Known as ‘MuddyWater,’ Cybersecurity Researchers Say.
Cybersecurity News | Quick Read
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
This Comes Soon After Emotet Started to Test Installing Cobalt Strike Beacons on Infected Devices Instead of Their Regular Payloads.
Cybersecurity News | Quick Read
Espionage Hacking Campaign Is Targeting Telecom Operators
Middle Eastern and Asian Telecommunications and IT Service Companies Are Being Targeted.
Cybersecurity News | Quick Read
Anubis Android Malware Is Back and It Is Focusing on Financial Institutions
The Most Recent Operations Affects Roughly 400 Targets.
Cybersecurity News | Quick Read
A List of Vulnerable Products to the Log4j Vulnerability
Details on What Vendor Products Are Impacted by This Flaw.
Cybersecurity News | Quick Read
IIS Extensible Web Server Used to Steal Microsoft Exchange Credentials
Cybersecurity Researchers Found a Malicious IIS Web Server Software Called `Owowa’.
Cybersecurity News | Quick Read
New Ransomware Family Deployed in Log4Shell Attacks
Malicious Actors Are Trying to Deploy a Ransomware Family Dubbed Khonsari.
Cybersecurity News | Quick Read
Agent Tesla Spyware Used in Phishing Campaign
The Spyware Is Part of an Ongoing Phishing Effort that Uses Microsoft PowerPoint Slides.
Cybersecurity News | Quick Read
Most Recent iOS Updates from Apple Fix Remote Jailbreak Exploit for iPhones
Read On and Find Out what Other Vulnerabilities Have Been Fixed with the Latest Updates.
Cybersecurity News | Quick Read
Karakurt: Another Threat Actor Group on the Cyberthreat Landscape
Its Main Focus Is Data Exfiltration.
Cybersecurity Basics | Quick Read
The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime
It Seems that the Threat Actors Were Able to Infiltrate Kronos’ Systems and Encrypted Servers.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats