This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
In the span of only four months, four large Android malware families were spread via Google Play, resulting in 300.000+ infections via multiple dropper apps, according to ThreatFabric research.
The U.S. Department of Justice (DOJ) arrested and charged a Ukrainian national for their involvement in the ransomware attack against IT company Kaseya in July.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..
How long does a cybercriminal’s timeline usually take? What are their moves? And what tools do they usually employ? To answer these questions, it helps to think like a hacker.
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a dangerous alternative.
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) says the 2020 SolarWinds supply chain cybersecurity compromise could have been prevented with a decade-old security recommendation.
Threat actors are now not only encrypting critical business systems, but also backups. They’ve brought businesses to a standstill, leaving some non-operational and really, with no good options for recovery. In many cases, it’s been pay the ransom to obtain a decryption key — or go out of business.