Home Blog Page 38
Check Point Research (CPR) has issued a warning about scammers exploiting Google Ads to steal crypto wallets. CPR observed that popular brands like Phantom and MetaMask were being impersonated and used as Google Ads on the search engine to...
Cyberattacks and data breaches via third-party vendors continue to become prevalent, affecting organizations’ critical data. Britain’s Labour Party recently announced that it had sustained a cyber incident via a third-party firm that handles its membership data. In an official...
With nearly 50% of the global corporate data being stored in the cloud, it is no surprise that cloud security has become an essential priority for cloud users. Many people even today argue that their data may be safer...
As you check into any hotel, a concierge will hand you a keycard. The card gives you access to your room, the fitness center and the pool during operating hours, and opens locked, non-main entrances to the building. Members...
Passwords are one of the most common techniques used to keep our information safe. However, with growing number of apps, it is not at all easy for a normal person to remember all passwords. Our research estimates that there...
BlackMatter cybercriminal group announced that it is shutting down operations, citing pressures from law enforcement authorities. Active since July 2021, BlackMatter offers ransomware-as-a-service (Raas), enabling threat actors and cybercriminal affiliates to deploy ransomware. BlackMatter operators have targeted several critical...
The FBI released a notification identifying the use of critical financial events and stock valuation to facilitate targeting and extortion of victims by ransomware groups. Threat actors are now going beyond network and data vulnerability and leveraging an organization's financial...
Australia's privacy watchdog, the Office of the Australian Information Commissioner (OAIC), stated that Clearview AI had violated privacy laws by harvesting users’ sensitive information without their consent and unfair methods. Clearview AI is a facial recognition platform that provides software...
Businesses have had to relook their strategies and navigate the new normal at a pace unimagined. If one thing has been the centerpiece of the world’s technical response to the pandemic, it is the cloud. While the focus on...
Cybercriminals have extended their cyberattack targets ranging from supply chains to critical infrastructures. While some threat actors try to penetrate vital network systems and compromise, other cybercriminal groups trade initial access credentials on the dark web. The latest analysis...