Home Blog Page 39
Conti gang, in yet another attack, has targeted a well-known U.K.-based luxury jewelry brand Graff. As per reports, the hackers have pillaged the personal details of the well-heeled clients of the firm and sold a part of the bounty...
Nowadays, it’s hard to find a person without a smartphone. With the ease of technology, the proliferation of smartphone culture has also brought in various kinds of security threats. A lot of sensitive information is being stored on these...
Artificial Intelligence models will soon be combined with Blockchain frameworks to enable automated decision making and a greater scope for creating intelligent financial products. Blockchain provides secure storage of digital monetary assets, while AI allows seamless sharing of data...
Cybersecurity experts from Menlo Labs identified two ransomware campaigns that distributed REvil and SolarMarker backdoors on the targeted networks by using SEO poisoning. The two campaigns, tracked as Gootloader and SolarMarker, are deploying ransomware backdoors employing SEO poisoning techniques. What...
Threat actor TA575 is piggybacking on a popular Netflix web series, Squid Game, as bait to propagate the Dridex malware. The threat group is sending out thousands of malicious emails to potential victims, enticing them through promises to be a...
The primary motivation of cybercriminals always differs. Sometimes it’s financial, otherwise it is to disrupt the services and create unnecessary chaos. Threat actors steal sensitive data to trade on the dark web or demand ransom. But to cause interruptions...
Back when security threats were relatively unsophisticated, understanding threats was easier.  Attackers often gained access by generating or guessing passwords. Passwords were drilled into both IT professionals and users as the front line of defense, and users had password...
Cross-site request forgery (CSRF) is a critical web application security vulnerability that is increasingly gaining prominence. As businesses embrace digital transformations with advancing technologies, the threat landscape has also widened for web application vulnerabilities. The first CSRF vulnerability exploit dates...
Now in its 18th year, Cybersecurity Awareness Month continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online. Brian Pereira, Editor-in-Chief, CISO...
Finding a person without having an online presence is difficult these days. Not emotionally, but today most people maintain virtual relations leveraging the ease of the internet. Due to increased digitalization, people are more connected than ever. Besides, the...