Threats

Tape Won’t Work for Ransomware Protection. Here’s Why.

Tape vendors have been promoting themselves as a solution to the ransomware problem because of their ability to provide air-gapped data backup, but trying...

Apple Patches Vulnerabilities in iOS Exploited by Spyware

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy...

Preparing for Ransomware: Are Backups Enough?

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but...

REvil Ransomware Group Resurfaces After Two Months Away

It was a short hiatus for the REvil ransomware group that signed off in July following several high-profile attacks by the Russia-based crew on...

Hackers Leak 87,000 Fortinet VPN Passwords

In the latest lesson about the importance of patching, the credentials for 87,000 Fortinet FortiGate VPNs have been posted on a dark web forum...

Vulnerability Could Expose HAProxy to HTTP Request Smuggling Attack

A critical vulnerability discovered in the open-source load balancer and proxy server HAProxy could enable bad actors to launch an HTTP Request Smuggling attack,...

Ransomware Group Ragnar Locker Threatens Data Leaks if Law Enforcement Contacted

The cybercriminal gang behind the Ragnar Locker ransomware attacks is threatening victims that it will go public with data captured in an attack if...

Zero Day Threats: Preparation is the Best Prevention

Zero day threats can be the source of some of the most dangerous kinds of cyberattacks. Zero day attacks take advantage of vulnerabilities that...

Salesforce Email Service Used for Phishing Campaign

Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel...

How DMARC Can Protect Against Ransomware

Domain-based Message Authentication, Reporting, and Conformance (DMARC) began gaining traction a few years ago as a way to validate the authenticity of emails. Now it...

Latest articles