Home Search
malware rudra - search results
If you're not happy with the results, please do another search
Email Threats Continue to be Gateway of Major Cyberattacks
Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...
New Ransomware LockFile Targets Victims with Intermittent Encryption Technique
A new ransomware variant has been making the rounds in the cyberthreat landscape. Security experts from Sophos uncovered new ransomware dubbed LockFile targeting victims...
These are the 3 Ps for Thwarting BEC Attacks
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...
These Are the Four Common DNS Attacks
From banking to e-commerce and retail to restaurant chains, it’s imperative for every business to have a digital presence on the internet today. However,...
Rags to Riches! The Evolution of Ransomware Operators
Detecting and preventing ransomware attacks have become the primary goal for most organizations. The cybersecurity community across the globe is severely concerned about the...
“IoT technology will always improve but it will never be 100% secure”
The proliferation of the Internet of Things (IoT) in consumer, enterprise, and health care sectors, and their internal vulnerabilities, have created a security blind...
4 Immediate Measures to Execute After a Cyberattack
Whether it is a global pandemic or the new normal, cybercriminals always find ways to target organizations and individuals for valuable digital assets. Most...
Has Your Organization Addressed These 3 Common Employee Habits?
Cybersecurity risks are a major concern for most organizations globally. Cyberattacks are often seen as threats from outside, but sometimes inadvertent actions from employees...
Cyberthreats Still Loom Over E-learning Platforms
The year 2020 is certainly a year of change. The pandemic changed every aspect of our lives, keeping people more connected than ever virtually....
Malvertising Mayhem: Here’s Everything You Need to Know
Cybercriminals often create innovative malware variants and malicious campaigns to steal users’ identities or private information. In most malware-related attacks, threat actors deploy malware...