Home Search
russian attackers - search results
If you're not happy with the results, please do another search
5.4 Mn DDoS Attacks Reported in H1 2021, Europe and EMEA Most Affected
Distributed Denial of Service (DDoS) attacks could cause severe damage to organizations’ critical systems. The number of DDoS attacks on global organizations has increased...
Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC, EMEA
Security researchers uncovered a widespread credential harvesting campaign targeting government agencies across seven countries in the Asia-Pacific (APAC), Europe, and the Middle East and...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
Chinese Hacking Group ‘DEV 0322’ Exploits SolarWinds Serv-U Software: Microsoft
The infamous SolarWinds attacks have left a severe impact on the cybersecurity landscape. While organizations are still recovering from its consequences, Microsoft recently warned...
Russia-based APT28 Linked to Mass Brute-force Attacks Against Cloud Networks
State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the...
NOBELIUM Group Targeted a Customer Care Agent at Microsoft
It’s a daily routine for the cybersecurity community to encounter new kinds of cyberthreats from old perpetrators. Recently, the Microsoft Threat Intelligence Center (MSTIC)...
U.S.-Russia Summit: Biden Tells Putin “Critical Infrastructure Should Be Off-limits” to Cyberattacks
Cyber intrusions have existed for decades. They still do, however, much of the cyber espionage today comes from geopolitically-inclined state actors, impacting both governments...
How SolarWinds Hackers ‘Nobelium’ Used Constant Contact in Mass Phishing Campaign
Nation state-backed cyberattacks have become widespread more than ever. They often leave a bad impression on the cybersecurity readiness of a nation. For instance,...
10 Legal Questions You Should Be Asking About Ransomware
Data extortion through cyber means is an insidious threat that thousands of companies throughout the world experience firsthand. For many bad actors, it is...