A variant of Loki info stealer that we detected through our honeypot is propagated as Windows CAB file email attachments. It uses process hollowing to evade detection.
Maze ransomware, notorious for not just encrypting but for stealing victims’ data, attacks a US IT firm. The company sent emails to customers which include IP addresses and file hashes that have been linked to previous Maze attacks.
Cybercriminals behind Nemty ransomware close down their Ransomware-as-a-Service (RaaS) operation as they zero in on private schemes. This is confirmed through a post in a Russian hacker forum.
Fake installers of popular messaging apps such as Viber and WhatsApp are propagated via fraudulent Russian websites. The installers are believed to be adware.
Video conferencing apps provide many benefits, but they also present organizations with the challenge of ensuring that their employees — and the data they work with — remain secure when using these apps.
As organizations make their move toward a more efficient and innovative future in the cloud, hybrid cloud environments pose several problems that can make or break their overall strategies.
Researchers detected the “Twin Flower” campaign that simulates increased clicks to boost network traffic, boosting SEO ranking and advertising revenue.
As the adoption of cloud services grows, organizations need to be informed about how to secure their environment. Our research examines the common threats encountered in the cloud and provides insight on how organizations can better deal with them.