BlackCat ransomware gang is accused of an exit scam
The BlackCat ransomware gang is executing an exit scam, attempting to shutter operations and abscond with affiliates’ funds under the guise of an FBI raid on their website and...
The BlackCat ransomware gang is executing an exit scam, attempting to shutter operations and abscond with affiliates’ funds under the guise of an FBI raid on their website and...
A ransomware attack took place on Duvel Moortgat Brewery, a well-known Belgian beer brand famous for its Duvel golden pale ale and other popular abbey beers. The attack occurred...
The National Cyber Security Centre (NCSC) of Switzerland has released a report detailing its investigation into a significant data breach resulting from a ransomware attack on Xplain, a prominent...
In today’s interconnected world, cybersecurity threats loom large for professional services firms. These firms, which often handle sensitive client data and proprietary information, are prime targets for cyberattacks. To...
In the ever-evolving landscape of cybersecurity, risk management has become a cornerstone in safeguarding organizations against digital threats. As cyberattacks grow in sophistication and frequency, the need for proactive...
Proofpoint, a security firm has issued a report detailing a new phishing campaign orchestrated by the threat actor TA577, observed on February 26 and 27, 2024. This campaign targeted...
In a recent report, Lookout uncovered a sophisticated phishing kit designed to target mobile users by impersonating login pages of prominent cryptocurrency services. The kit employs a combination of...
Security researchers have uncovered a new Linux malware named GTPDOOR, specifically crafted to infiltrate telecom networks adjacent to GPRS roaming exchanges (GRX). What distinguishes GTPDOOR is its ingenious use...
In an age where digital threats evolve at breakneck speed, the future of cybersecurity hinges on innovative technologies that can adapt and defend against increasingly sophisticated attacks. One such...
One of the main weaknesses of artificial intelligence (AI) is its dependence on training data. If this data contains sensitive information, there is a risk of leakage of this...