Home Search

ransom - search results

If you're not happy with the results, please do another search
SideCopy Malware Campaign

COVID-19 and the Current Cyberthreat Landscape in India

0
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of...
Microsoft November 2021 Patch Tuesday, Windows 10, Microsoft PrintNightmare

NSA Alerts About Four Critical Vulnerabilities in Microsoft Exchange Servers

0
The National Security Agency (NSA) informed Microsoft about four critical vulnerabilities that could be exploited by attackers to compromise Microsoft Exchange Servers remotely. The...
median dwell time, Supercharged AI Cyberattacks are Unavoidable

Global Median Dwell Time Drops Below One Month: FireEye Report

0
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...

Identity Management Day: Here’s What Experts Have to Say

0
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
power

Hackers Have an Appetite for Indian Power Companies

0
Tearing a page from the bad actor’s handbook was a recent China nation-state attack against 10 Indian power sector companies. Tensions between China and...
User Verification Policy, zero trust approach

How to Remove Single Points of Failure from your Digital Infrastructure

0
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
data breaches, Verizon Data Breach Investigation Report

4 Common Attack Vectors You Need to Know

0
Online adversaries always advance their hacking techniques to enhance their attack vectors. Cybercriminal groups focus on different kinds of cyberthreats such as data breaches,...

CISO MAG’s April 2021 Issue Highlights Attack Vectors with COVID and Vaccine Themes

0
It would not be an exaggeration to say that COVID-19 vaccines are the most sought-after commodity today. Vaccine producers are working overtime to produce...
COVID-19, Corona, Coronavirus

Cybersecurity Post-COVID: A New Era of Sophistication

0
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...
cybersecurity

ICS is Becoming a Hot Favorite of Threat Actors: Kaspersky Report

0
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked...