Threat Intelligence Center
Deep Web
The Deep Web and the Cybercriminal Underground
Leggi l'articolo
Ultimi aggiornamenti
From Bounty to Exploit: Cybercriminals Use Crowdsourcing for New Attacks
From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this article, we tackle these contests, explore their results, and anticipate their possible impacts on the work of cybersecurity defenders.
Leggi l'articolo
Leggi l'articolo
Security Strategies for Enterprises
News and updates on the latest security threats to enterprises, and strategy guides on how to deal with them.
Leggi l'articolo
Ultimi aggiornamenti
Ransomware Recap: Clop, DeathRansom, and Maze Ransomware
As the new year rolls in, new developments in different ransomware strains have emerged. Here we discuss the different techniques that Clop, DeathRansom, and Maze ransomware use and the ways users and organizations can protect themselves against infection.
Leggi l'articolo
Leggi l'articolo
Targeted Attacks
The latest news and information on targeted attacks and IT security threats so you stay ahead of advanced persistent threats.
Leggi l'articolo
Ultimi aggiornamenti
Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native Applications
We provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.
Leggi l'articolo
Leggi l'articolo
Securing ICS Environments
News and research on threats to ICS/SCADA and protecting systems behind critical infrastructure
Leggi l'articolo
Ultimi aggiornamenti
Dymalloy, Electrum, and Xenotime Hacking Groups Set Their Targets on US Energy Sector
At least three hacking groups have been identified aiming to interfere with or disrupt power grids across the United States. Attempts in attacking the utilities industry are on the rise, according to a report on the state of industrial control systems (ICSs).
Leggi l'articolo
Leggi l'articolo
Internet of Things
The IoT connects things, people, processes and networks through the internet, but it could also be open to attacks that target it.
Leggi l'articolo
Ultimi aggiornamenti
Cellular IoT Vulnerabilities: Another Door to Cellular Networks
Cellular IoT vulnerabilities show an increasing trend over the years, indicating that these devices are becoming more and more popular — and that they are being targeted more frequently.
Leggi l'articolo
Leggi l'articolo
Mobile Safety
News and updates on the latest threats for the mobile platform, as well as guides on how to protect your mobile devices.
Leggi l'articolo
Ultimi aggiornamenti
Mobile Security: 80% of Android Apps Now Encrypt Network Traffic by Default
Google has provided an update stating that 80% of Android apps have adopted the HTTPS standard by default. HTTPS encrypts network traffic, preventing third parties from intercepting data from apps.
Leggi l'articolo
Leggi l'articolo