The attacks by Ransomware are well established as a legitimate threat, yet until now they haven’t been treated seriously. Prevention of a problem that may or could not occur was not regarded as a decent IT or investment in security because... Read more
No amount of awareness training can eradicate the cascading effects of a wrong click. But the costs for attackers can always be increased and the odds of achieving its aims can be reduced. It can be done by establishing a road of greatest resist... Read more
The notorious financially-motivated FIN7 cybercrime leaders instill a backdoor, known as the Lizar, as a Windows pen-testing tool for ethical hackers. FIN7 is said to be a legitimate body that has been using the security analysis system. Accordi... Read more
A cyber-enabled influence effort codenamed Ghostwriter was discovered in July 2020. Poland, Lithuania, and Latvia were the main targets. The campaign, however, has been linked to an unclassified threat actor, according to some developments cited... Read more
In recent years the growing threats to Apple computers have gone mainstream and cybercriminals are doing everything they can to exploit the publicly disclosed vulnerabilities. The Shlayer malware was recently abused by a perilously bad vulnerabi... Read more