It is common knowledge that businesses and people should safeguard publicly accessible applications and services against latent threats. Threat actors are always looking for easier methods to infiltrate a network, thus there will always be weak... Read more
When a major event occurs in the globe, cybercriminals attempt to profit from it. For the same apparent reasons, fraudsters are keeping an eye on the Tokyo Olympics. Researchers and security agencies have already issued warnings about the event... Read more
According to a few researcher’s analyses, scams accounted for 59% of blocked dangerous content generated by the user during the first quarter of the year. The research analyzes how armed content advances the fraud economy and consumer perc... Read more
The Lazarus APT Group in North Korea again makes the headlines. This time, the threat actor runs a campaign that includes reputable defense contractors and targets job seekers and engineers in governmental organizations. What transpired? Accordi... Read more
In the fiscal year 2020, a risk evaluation of 37 attack strategies has been performed by the Cybersecurity and Infrastructure Security Agency (CISA) in several sectors. Six sequential infection stages were mapped to these tactics using the MITRE... Read more