The attacks by Ransomware are well established as a legitimate threat, yet until now they haven’t been treated seriously. Prevention of a problem that may or could not occur was not re... Read more
No amount of awareness training can eradicate the cascading effects of a wrong click. But the costs for attackers can always be increased and the odds of achieving its aims can be reduced. I... Read more
The notorious financially-motivated FIN7 cybercrime leaders instill a backdoor, known as the Lizar, as a Windows pen-testing tool for ethical hackers. FIN7 is said to be a legitimate body th... Read more
A cyber-enabled influence effort codenamed Ghostwriter was discovered in July 2020. Poland, Lithuania, and Latvia were the main targets. The campaign, however, has been linked to an unclassi... Read more
In recent years the growing threats to Apple computers have gone mainstream and cybercriminals are doing everything they can to exploit the publicly disclosed vulnerabilities. The Shlayer ma... Read more
A large-scale business email compromise (BEC) campaign was detected by tech giants Microsoft that used using typo-squatted domains registered a few days before the attacks started for target... Read more