Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware

A suspected pro-Houthi threat group targeted at least three humanitarian organizations in Yemen with Android spyware designed to harvest sensitive information.These attacks, attributed to...

New Linux Variant of Play Ransomware Targeting VMWare ESXi Systems

Cybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that's designed to target VMWare...

Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking

A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced "technology suite" that...

Healthcare suffered by 187 Million Monthly Web App Attacks in 2020

Web application attacks within the healthcare sector surged in December as distribution of the primary COVID-19 vaccines began, consistent with new data from Imperva. The...

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating...

Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of...

Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over...

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS...

Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that impersonated...

4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

You're probably familiar with the term "critical assets".These are the technology assets within your company's IT infrastructure that are essential to the functioning of...

How to Build Your Autonomous SOC Strategy

Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operations center (SOC)....

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts