A group named Crypt Ghouls has been identified as responsible for a series of ransomware attacks targeting Russian businesses and government organizations. Their main...
North Korean information technology (IT) workers who secure jobs under false pretenses in Western companies are not only engaging in intellectual property theft, but...
Threat actors are constantly evolving their tactics to evade cybersecurity measures, devising innovative ways to steal user credentials. Hybrid password attacks combines multiple cracking...
Cybersecurity researchers have discovered a new digital skimmer campaign named Mongolian Skimmer, which uses Unicode obfuscation techniques to hide its malicious code.
Analysis by Jscrambler...
Ivanti has issued a warning regarding three new security vulnerabilities affecting its Cloud Service Appliance (CSA) that are currently being actively exploited in the...
Reports from Bloomberg and Reuters indicate that Ukraine has taken credit for a cyber attack on Russia's state media company, VGTRK, which caused disruptions...
Securing a company's systems used to be about securing the "perimeter," with firewalls keeping everything inside safe. However, the shift to distributed cloud environments...