16.6 C
Munich
Thursday, June 13, 2024
- Advertisement -

ARCHIVE

Monthly Archives: April, 2023

Securing Cloud Data with a CASB: A Guide to Selection and Implementation

With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...

LockBit Ransomware Group Issues Unconditional Apology and Promises Free Decryptor for Victims

In a surprising turn of events, the notorious LockBit ransomware group issued an unconditional apology for its recent attack on the Olympia Community Unit...

Trigona Ransomware: A Menacing Threat to Windows Users

Trigona ransomware is a newly discovered malware that poses a serious threat to Windows users. The Unit42 research team at Palo Alto Networks recently...

Breach Alert: Kodi’s User Database Hacked and Stolen

Open-source media player software provider, Kodi, has announced a data breach after hackers stole the company's MyBB forum database, including private messages and user...

Cyber Attack on NATO by KillNet: A Threat to Global Security

Introduction Cyber attacks have become a rising threat to global security, and one such group that has gained notoriety is KillNet. Originating during the Russian...

Unmasking the Cryptocurrency Stealer Malware: A Sophisticated Supply Chain Attack on .NET Developers

Recently, cybersecurity researchers uncovered the techniques used in a sophisticated supply chain attack aimed at .NET developers. The attack employed 13 malicious NuGet packages,...

Beware of Malicious Loaders: Android Apps Infected with Trojanized Malware

As the number of mobile phone users is increasing, so is the number of security threats that come along with it. Criminals have found...

Protect Your Apple Devices: Two Zero-Day Vulnerabilities Exploited by Hackers

Apple has always been known for its state-of-the-art technology, and the brand's devices have become an integral part of our daily lives. However, with...

Protect Your Network Now: US CISA Adds Veritas Backup Exec Vulnerabilities to Its Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) in the US has recently updated its Known Exploited Vulnerabilities Catalog to include five new issues that...

Microsoft and Fortra’s Legal Crackdown on Cobalt Strike: A Significant Blow to Cybercriminals

The Collaboration between Microsoft’s DCU, Fortra, and Health-ISAC A recent joint operation between Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health-ISAC has resulted in...

Latest news

- Advertisement -