Home Search

ransom - search results

If you're not happy with the results, please do another search

Attackers Using Taylor Swift Image to Hide Malware Payloads

0
Security researchers discovered that cryptocurrency-mining botnet operators were using pop singer Taylor Swift’s image to hide their malware payloads. The botnet, dubbed as MyKingz,...
California Consumer Privacy Act

U.S. Senators Introduce an Act to Safeguard K-12 Schools

0
K-12 district schools have been a soft target for cybercriminals in the year gone by. To address the rising threat prospective, two U.S. Senators,...
State Bank of India

SBI warns: Public Charging Stations Can be Used for Juice Jacking

0
Is your mobile phone running out of juice?  Need a quick charge? Ah, there is a public charging station! Wait, is it safe? May...
Phishing, phishing attacks

Microsoft Reveals Smart Phishing Techniques of 2019

0
Security experts said cybercriminals are customizing their Phishing attack methods to trick companies and their users. According to Microsoft, phishing campaigns grew from 0.2...

Rewind: Biggest Cyber Incidents We Saw in 2019

0
By Rudra Srinivas  If there is a thing or two that we can learn from the year that went by, it is the fact that...

6 Times Data Regulators Churned Out High Penalties in 2019

0
By Rudra Srinivas Data breaches and security incidents are becoming increasingly expensive. The risk of data breaches got higher after introducing the European Union’s General...
BMW Data Breach

APT Hacker Group Targets BMW and Hyundai Networks

0
A notorious APT hacker group “OceanLotus” compromised the network systems of automobile giant BMW and installed a hacking tool known as “Cobalt Strike” to...
Microsoft Azure Account

Security Flaw in Microsoft Azure Lets Hackers Control Azure Accounts

0
Security analysts from cybersecurity firm CyberArk recently found a critical vulnerability in Microsoft Azure that allows attackers to take control over Microsoft Azure user...

New Malware “PyXie” Uses Trojanized Tetris Game

0
Researchers have discovered a malware operation that uses a trojanized version of Tetris game to target healthcare and educational institutions for credential stealing. Security pros at Blackberry Cylance stated...
Android Trojan, Trojan, ReverseRat, Numando Banking Trojan

What You Need to Know Now About Banking Trojans

0
By Derek Manky, Chief of Security Insights and Global Threat Alliances, Fortinet Cybercriminals continue to refine existing malware to evade detection and deliver increasingly sophisticated...