Threats

Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw

Nation-state cyber threat groups and ransomware attackers are moving in to exploit a critical flaw found in the seemingly ubiquitous Apache Log4j open-source logging tool, as attacks spread just days ...

Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat

Cybercriminals are quickly ramping up efforts to exploit the critical flaw found in the widely used Log4j open-source logging tool, targeting everything from cryptomining to data theft to botnets that...

Cybersecurity ‘Vaccines’ Emerge as Ransomware, Vulnerability Defense

Cybersecurity vaccines are emerging as a new tool to defend against threats like ransomware and zero-day vulnerabilities. Cybersecurity firms have released "vaccines" in recent days to protect agai...

Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk

A critical vulnerability in the open-source logging software Apache Log4j 2 is fueling a chaotic race in the cybersecurity world, with the Apache Software Foundation (ASF) issuing an emergency securit...

AT&T Looks to Shut Down Botnet that Attacked 5,700 Network Appliances

AT&T is working to stop a botnet that has infected at least 5,700 network edge servers inside its networks and appears designed to steal sensitive information and launch distributed denial-of-serv...

Nation-State Attackers Use RTF Injection to Easily Spread Malware

Hacking groups linked to Russia, China and India are leveraging a novel attack technique that makes it easier for them to spread malware, steal data and evade detection, according to a report this wee...

Best Privileged Access Management (PAM) Software for 2022

Privileged accounts are among an organization’s biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average system...

Companies Get Better at Fighting Ransomware Despite Escalating Threats

In a year in which ransomware attacks seem to get worse by the day, companies have made surprising progress defending themselves against attacks. But the attention paid to the malware by journalist...

How Hackers Use Payloads to Take Over Your Machine

A payload is a piece of code that executes when hackers exploit a vulnerability. In other words, it’s an exploit module. It’s usually composed of a few commands that will run on the targeted operating...

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized i...

Latest articles