Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Based on the security researchers’ analysis of the 2023 cyberthreat landscape, we highlight new or heightened risks. Continue reading Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia. Continue reading Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Kaspersky’s Advanced Persistent Threats Predictions for 2024

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky’s security predictions. Get extensive APT mitigation tips, too. Continue reading Kaspersky’s Advanced Persistent Threats Predictions for 2024

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Continue reading Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

A new malware is bypassing an Android 13 security measure that restricts permissions to apps downloaded out of the legitimate Google Play Store. Continue reading New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Continue reading EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. Protect your company from Octo Tempest with these tips. Continue reading Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating this cybersecurity attack. Continue reading New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured. Continue reading New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub. Continue reading New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware