Home Search
remote work - search results
If you're not happy with the results, please do another search
‘SharkBot’ Android Trojan Found Targeting Banking Apps and Crypto Exchanges
A new botnet, dubbed “SharkBot,” is targeting Italy, the U.K., and the U.S., including banking applications and cryptocurrency exchanges.
The Cleafy TIR team discovered the...
The State of Readiness Will Always Be in Flux
Threats introduced by careless employees working from home looms large today. Studies show that 40% - 50% of employees will click on links in...
CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
BotenaGo – A New Malware Targeting Millions of IoT Devices
Cybersecurity researchers at AT&T Labs uncovered a new malware variant targeting routers and IoT devices. Tracked as BotenaGo, the malware is leveraging over 30...
Trickbot Remains the Most Prevalent Malware
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old...
HTML Smuggling – A Novel Malware Deploying Technique
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365...
Cloud Computing Security 2022: Upgrading the Cloud to Make Infosec Efficacious
Cloud computing security (CCS) is an essential aspect for businesses when securing virtual data, however, like any other domain within IT security, it comes...
How to Uproot Rootkit Threats
Threat actors leverage Trojans, malware, and ransomware to break into victims’ systems and cause maximum damage. We explain a different kind of malware threat...
Chinese Cyber Espionage Campaign Found Exploiting Zoho Vulnerability
Critical infrastructure and technology vendors become a frequent target for state-sponsored adversaries. A security research team from Palo Alto Networks’ Unit 42 uncovered an...
What Does Good IT Security Look Like?
Cyber intrusion activity globally jumped 125% in the first half of 2021 compared to the previous year, according to Accenture, with ransomware and extortion...