No amount of awareness training can eradicate the cascading effects of a wrong click. But the costs for attackers can always be increased and the odds of achieving its aims can be reduced. It can be done by establishing a road of greatest resist... Read more
The notorious financially-motivated FIN7 cybercrime leaders instill a backdoor, known as the Lizar, as a Windows pen-testing tool for ethical hackers. FIN7 is said to be a legitimate body that has been using the security analysis system. Accordi... Read more
A cyber-enabled influence effort codenamed Ghostwriter was discovered in July 2020. Poland, Lithuania, and Latvia were the main targets. The campaign, however, has been linked to an unclassified threat actor, according to some developments cited... Read more
In recent years the growing threats to Apple computers have gone mainstream and cybercriminals are doing everything they can to exploit the publicly disclosed vulnerabilities. The Shlayer malware was recently abused by a perilously bad vulnerabi... Read more
A large-scale business email compromise (BEC) campaign was detected by tech giants Microsoft that used using typo-squatted domains registered a few days before the attacks started for targeting more than 120 organizations. Various tactics are us... Read more