- Advertisement -
ARCHIVE
Monthly Archives: April, 2023
Securing Cloud Data with a CASB: A Guide to Selection and Implementation
With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...
LockBit Ransomware Group Issues Unconditional Apology and Promises Free Decryptor for Victims
TheCISO -
In a surprising turn of events, the notorious LockBit ransomware group issued an unconditional apology for its recent attack on the Olympia Community Unit...
Trigona Ransomware: A Menacing Threat to Windows Users
Trigona ransomware is a newly discovered malware that poses a serious threat to Windows users. The Unit42 research team at Palo Alto Networks recently...
Breach Alert: Kodi’s User Database Hacked and Stolen
Open-source media player software provider, Kodi, has announced a data breach after hackers stole the company's MyBB forum database, including private messages and user...
Cyber Attack on NATO by KillNet: A Threat to Global Security
TheCISO -
Introduction
Cyber attacks have become a rising threat to global security, and one such group that has gained notoriety is KillNet. Originating during the Russian...
Unmasking the Cryptocurrency Stealer Malware: A Sophisticated Supply Chain Attack on .NET Developers
TheCISO -
Recently, cybersecurity researchers uncovered the techniques used in a sophisticated supply chain attack aimed at .NET developers.
The attack employed 13 malicious NuGet packages,...
Beware of Malicious Loaders: Android Apps Infected with Trojanized Malware
TheCISO -
As the number of mobile phone users is increasing, so is the number of security threats that come along with it. Criminals have found...
Protect Your Apple Devices: Two Zero-Day Vulnerabilities Exploited by Hackers
TheCISO -
Apple has always been known for its state-of-the-art technology, and the brand's devices have become an integral part of our daily lives. However, with...
Protect Your Network Now: US CISA Adds Veritas Backup Exec Vulnerabilities to Its Exploited Vulnerabilities Catalog
TheCISO -
The Cybersecurity and Infrastructure Security Agency (CISA) in the US has recently updated its Known Exploited Vulnerabilities Catalog to include five new issues that...
Microsoft and Fortra’s Legal Crackdown on Cobalt Strike: A Significant Blow to Cybercriminals
The Collaboration between Microsoft’s DCU, Fortra, and Health-ISAC
A recent joint operation between Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health-ISAC has resulted in...
Latest news
- Advertisement -