Threats

HTML Smuggling Techniques on the Rise: Microsoft

Bad actors are increasingly using a technique called HTML smuggling to deliver ransomware and other malicious code in email campaigns aimed at financial services firms and other organizations, accordi...

Hacker Compromises FBI Server to Send Fake Emails

Hackers got into an email server at the FBI over the weekend to spread fake messages in an attempt to blame a cybersecurity expert for non-existent attacks, apparently in hopes of damaging his reputat...

DDoS Attacks Skyrocket, Kaspersky Researchers Say

Distributed denial of service (DDoS) attacks soared in the third quarter, giving organizations yet another cyber threat to worry about. Kaspersky researchers reported that total attacks were up by ...

Arrest in Kaseya Attack Highlights Government Ransomware Progress

U.S. law enforcement officials this week announced the indictments of a Ukrainian national and a Russian citizen in connection with ransomware campaigns by the recently shuttered REvil cybercriminal g...

Best Risk Management Software for 2022

Every organization needs visibility into the potential threats they face daily. Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, ...

U.S. State Department Puts $10 Million Bounty on DarkSide Ransomware Group

The United States government is putting a $10 million bounty on the leaders of the DarkSide cybercriminal organization, the ransomware group behind the attack earlier this year on Colonial Pipeline th...

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

It's been an active week for security vulnerabilities, with MITRE and the U.S. Cybersecurity & Infrastructure Agency (CISA) revealing hundreds of critical vulnerabilities. CISA ordered federal ...

Fake Company Sheds Light on Ransomware Group Tactics

Ransomware groups seem to change form daily. In the latest news, the BlackMatter ransomware group announced it was shutting down - and just hours later came news that its victims were being transferre...

‘Trojan Source’ a Threat to All Source Code, Languages

Researchers have outlined a method that could be used by bad actors to push vulnerabilities into source code that are invisible to human code reviewers. In a paper released this week, two researche...

SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

Cybercriminals leveraging the SolarMarker .NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials an...

Latest articles