Threats

Could You Be a Ransomware Target? Here’s What Attackers Look For

Ransomware is one of the fastest-growing and most destructive cyber threats today. Cybersecurity researchers largely agree that ransomware growth has been astronomical; the only question...

How to Prevent Ransomware Attacks in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security professionals than the threat of ransomware. Ransomware...

Hackers Alter Cobalt Strike Beacon to Target Linux Environments

A significant part of hacking consists of diverting the function of existing systems and software, and hackers often use legitimate security tools to perform...

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim...

Tape Won’t Work for Ransomware Protection. Here’s Why.

Tape vendors have been promoting themselves as a solution to the ransomware problem because of their ability to provide air-gapped data backup, but trying...

Apple Patches Vulnerabilities in iOS Exploited by Spyware

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy...

Preparing for Ransomware: Are Backups Enough?

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but...

REvil Ransomware Group Resurfaces After Two Months Away

It was a short hiatus for the REvil ransomware group that signed off in July following several high-profile attacks by the Russia-based crew on...

Hackers Leak 87,000 Fortinet VPN Passwords

In the latest lesson about the importance of patching, the credentials for 87,000 Fortinet FortiGate VPNs have been posted on a dark web forum...

Vulnerability Could Expose HAProxy to HTTP Request Smuggling Attack

A critical vulnerability discovered in the open-source load balancer and proxy server HAProxy could enable bad actors to launch an HTTP Request Smuggling attack,...

Latest articles