Threats

Chinese Attackers Use New Rootkit in Long-Running Campaign Against Windows 10 Systems

A previously unknown but highly skilled Chinese-speaking cyberespionage group is using sophisticated malware to attack government and private entities in Southeast Asia through a...

Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems

Underground services are cropping up that are designed to enable bad actors to intercept one-time passwords (OTPs), which are widely used in two-factor authentication...

Best Ransomware Removal Tools

Ransomware is everywhere these days, striking fear into the hearts of IT and business managers alike. And studies support that perception, showing ransomware growing in...

Could You Be a Ransomware Target? Here’s What Attackers Look For

Ransomware is one of the fastest-growing and most destructive cyber threats today. Cybersecurity researchers largely agree that ransomware growth has been astronomical; the only question...

How to Prevent Ransomware Attacks in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security professionals than the threat of ransomware. Ransomware...

Hackers Alter Cobalt Strike Beacon to Target Linux Environments

A significant part of hacking consists of diverting the function of existing systems and software, and hackers often use legitimate security tools to perform...

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim...

Tape Won’t Work for Ransomware Protection. Here’s Why.

Tape vendors have been promoting themselves as a solution to the ransomware problem because of their ability to provide air-gapped data backup, but trying...

Apple Patches Vulnerabilities in iOS Exploited by Spyware

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy...

Preparing for Ransomware: Are Backups Enough?

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but...

Latest articles