Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But there’s good news: you don’t have to be defenseless. What if you could gain a strategic edge? Join our exclusive webinar, “Unpacking […]
Category Archives: Uncategorized
SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half measures and hope their SaaS stack will remain secure. Unfortunately, this approach is lacking and will leave security teams blind to threat prevention and detection, as well as open to regulatory violations, […]
Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions. The new version has been codenamed Octo2 by the malware author, Dutch security firm ThreatFabric said in a report shared with The Hacker News, adding campaigns distributing […]
The latest version of the evolving threat is a multi-stage attack demonstrating a move away from ransomware to purely espionage activities, typically targeting Ukraine and its supporters. Go to Source Author: Elizabeth Montalbano, Contributing Writer
In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone numbers to authorities in response to valid legal requests in an attempt to rein in criminal activity on the platform. “We’ve made it clear that the IP addresses and phone numbers of those who violate […]
The group has used more than 30 custom tools to target high-value government and telecommunications organizations on behalf of Iranian intelligence services, researchers say. Go to Source Author: Nate Nelson, Contributing Writer
The company has jettisoned hundreds of thousands of unused apps and millions of unused tenants as part of its Secure Future Initiative. Go to Source Author: Jai Vijayan, Contributing Writer
Some users complain they had no idea the switch would be automatic on their devices, vowing to uninstall the unwanted antivirus software. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies. Go to Source Author: Jai Vijayan, Contributing Writer
Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies — while having a little fun. Go to Source Author: Jennifer Lawinski, Contributing Writer
