Home Blog Page 37
What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in different ways, changing the way we live and conduct business. As its pervasiveness becomes a...
Threat actors leverage Trojans, malware, and ransomware to break into victims’ systems and cause maximum damage. We explain a different kind of malware threat that impacts users’ data privacy and security – Rootkits. Cybercriminals often utilize rootkits to spy...
Critical infrastructure and technology vendors become a frequent target for state-sponsored adversaries. A security research team from Palo Alto Networks’ Unit 42 uncovered an ongoing cyberespionage campaign that has already targeted nine organizations belonging to critical global sectors, including...
Cyber intrusion activity globally jumped 125% in the first half of 2021 compared to the previous year, according to Accenture, with ransomware and extortion operations one of the major contributors behind this increase. According to the FBI, there was...
Besides leveraging various intrusion techniques, cybercriminals use different tactics to receive payments from victims and evade detection. Cryptocurrency criminals are forcing victims to use crypto ATMs and QR codes to complete their payments, the FBI warned in its latest...
A U.S. government defense contractor, Electronic Warfare Associates (EWA), was a victim of a data breach due to an email phishing incident. Per a disclosure notification dated November 4, 2021, the defense contractor EWA was a victim of a...
The U.S. government is determined to eliminate the growing cyberattacks and cybercrime affiliates in the country. The U.S. Department of State recently announced a $10 million bounty for information on the activities or location of the DarkSide ransomware group...
The wireless communication technology has stepped into the era of 5G, which is a label to an immensely fast and sophisticated data network. 5G has the potential to make the world much more connected due to its critical features...
SQL Injection Attacks are amongst the most prevalent type of attacks today, which primarily targets web applications. With the rise in the use of web applications because of their efficiency and convenience, attackers have developed various techniques to infiltrate...
The threat of unpatched vulnerabilities is one of the pressing security issues for organizations worldwide. Despite necessary cybersecurity initiatives, threat actors continue to exploit unpatched flaws to penetrate critical systems. The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...