The FBI released a notification identifying the use of critical financial events and stock valuation to facilitate targeting and extortion of victims by ransomware groups.
Threat actors are now going beyond network and data vulnerability and leveraging an organization's financial...
Australia's privacy watchdog, the Office of the Australian Information Commissioner (OAIC), stated that Clearview AI had violated privacy laws by harvesting users’ sensitive information without their consent and unfair methods.
Clearview AI is a facial recognition platform that provides software...
Businesses have had to relook their strategies and navigate the new normal at a pace unimagined. If one thing has been the centerpiece of the world’s technical response to the pandemic, it is the cloud. While the focus on...
Cybercriminals have extended their cyberattack targets ranging from supply chains to critical infrastructures. While some threat actors try to penetrate vital network systems and compromise, other cybercriminal groups trade initial access credentials on the dark web. The latest analysis...
Conti gang, in yet another attack, has targeted a well-known U.K.-based luxury jewelry brand Graff. As per reports, the hackers have pillaged the personal details of the well-heeled clients of the firm and sold a part of the bounty...
Nowadays, it’s hard to find a person without a smartphone. With the ease of technology, the proliferation of smartphone culture has also brought in various kinds of security threats. A lot of sensitive information is being stored on these...
Artificial Intelligence models will soon be combined with Blockchain frameworks to enable automated decision making and a greater scope for creating intelligent financial products. Blockchain provides secure storage of digital monetary assets, while AI allows seamless sharing of data...
Cybersecurity experts from Menlo Labs identified two ransomware campaigns that distributed REvil and SolarMarker backdoors on the targeted networks by using SEO poisoning. The two campaigns, tracked as Gootloader and SolarMarker, are deploying ransomware backdoors employing SEO poisoning techniques.
What...
Threat actor TA575 is piggybacking on a popular Netflix web series, Squid Game, as bait to propagate the Dridex malware.
The threat group is sending out thousands of malicious emails to potential victims, enticing them through promises to be a...
The primary motivation of cybercriminals always differs. Sometimes it’s financial, otherwise it is to disrupt the services and create unnecessary chaos. Threat actors steal sensitive data to trade on the dark web or demand ransom. But to cause interruptions...