Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or patched – to fix bug...
Category: Attack
May 17, 2023Ravie LakshmananCyber Crime / Ransomware A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) ...
May 16, 2023Ravie LakshmananOnline Security / Malware The threat actors behind the CopperStealer malware resurfaced with two new campaigns in ...
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cyb...
May 16, 2023Ravie LakshmananNetwork Security / Threat Intel The Chinese nation-state actor known as Mustang Panda has been linked to a new set...
May 16, 2023Ravie LakshmananCyber Crime / Ransomware Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme ear...
May 16, 2023Ravie LakshmananEndpoint Security / Cyber Threat A Golang implementation of Cobalt Strike called Geacon is likely to garner the at...
May 15, 2023Ravie LakshmananLinux / Hypervisor Jackpotting A new ransomware-as-service (RaaS) operation called MichaelKors has become the late...
May 15, 2023Ravie LakshmananCyber Threat / Malware Government, aviation, education, and telecom sectors located in South and Southeast Asia ha...
It's easy to think high-tech companies have a security advantage over other older, more mature industries. Most are unburdened by 40 years of le...