Industry researchers recently studied a Linux version of the DarkSide malware and published a detailed analysis. In the recent quarter, the DarkSide ransomware group has been one of the most active ransomware groups. Colonial Pipeline was target... Read more
Malicious packages have recently been detected in PyPI by researchers, a software code repository, that turn developers’ workstations into cryptomining machines. What Transpired? Each infected package might be used to launch a supply-chain... Read more
Adversarial Octopus is an attack tactic created by independent researchers that could be used to target facial recognition systems. It has an influence on a number of current AI-driven facial recognition tools, making them vulnerable to attacks.... Read more
Active Directory is frequently rejected as just another service to be regained as a result of a cyber-attack and security is an afterthought. The hard reality is, however, that your entire ecosystem is affected if the Active Directory is fo... Read more
Security experts have learned a lot from 2016 about how cyber warfare has the ability to disrupt everything from energy and education, government and military activities. Whether it’s countries like China, Russia, Iran, and North Korea, gu... Read more