Home Blog Page 28
Despite several employee awareness programs and cybersecurity best practices, most organizations face insider threats that affect the overall security posture. Threat actors continue to target unwitting employees – the weakest link – with different social engineering and phishing lures...
The onset of the pandemic in 2020 saw an unimaginable shift to the digital world, where millions dived into cyberspace both as users and service providers. With restrictions imposed on physical mobility across the globe, even non-tech-savvy individuals had...
Hardware vendor QNAP released a security advisory warning its users about a new cryptomining malware targeting its network-attached storage (NAS) devices. The Taiwan-based company urged users to take necessary security measures to prevent the ongoing malware campaign. Once the malware...
Cybercrimes have been constantly evolving and extending across national boundaries in the 21st century. Their complexity, along with the ability of threat actors to constantly change and adapt, has now become an important security concern for businesses of all...
Google recently disrupted the malware activities of a sophisticated botnet – Glupteba. The search engine giant claimed the Glupteba botnet has been targeting Windows systems by protecting itself using blockchain technology. Google disrupted the key command and control infrastructure...
Remote work and distributed environments have disrupted long established security models and workflows. Security architects had to re-adapt, re-architect, and rebuild security for remote workers, with the rapid de-perimeterization we witnessed over the months. A multi-layered approach had to...
Microsoft announced that it had disrupted the operations of a Chinese cyberespionage group targeting organizations in the U.S. and 28 other countries. Tracked as Nickel, the advanced persistent threat (APT) group has been linked to various cyberattacks across the...
In a report, the ANSSI (French National Cybersecurity Agency) revealed that it has observed several phishing campaigns directed against French entities since February 2021. These compromised email accounts of French organizations were used to spread the malware and send...
Cybercriminals are creating new phishing strategies and malware variants to make their attacks more intense and successful. They even rely on phishing kits, which are readily available on darknet forums, to exploit their targeted systems. By Rudra Srinivas, Senior Feature Writer,...
The evolution of cryptocurrencies has attracted cybercriminal groups globally.  Cryptocurrency exchanges and hot wallets continue to become a primary target for threat actors.  The recent victim to join the bandwagon of crypto hacks is the cryptocurrency trading platform BitMart. In...