Across the hybrid, multi-cloud environments data storage needs are growing exponentially. At the same time, along with digital threats like data ransomware, theft, and misuse, organizations are faced with a greater number of regulations to follo... Read more
In order to dodge the detection by security solutions, threat actors with sophisticated tools and tactics at their disposal often hide their malicious communications through innovative techniques. In one such security incident, an attempt was ma... Read more
A new botnet leveraging nearly a dozen exploits of high and critical severity vulnerabilities against Windows systems to turn them into crypto mining clients and sources for distributed denial-of-service (DDoS) has been identified. Even when its... Read more
With the evolution of technology in recent times, cyber threat intelligence (CTI) has become the fastest-growing element in cybersecurity. In the years to come, spending on it is expected to rise at a rapid pace. Industries across the globe have... Read more
With threat actors increasingly choosing to publicize Ransomware-as-a-service, this week we take a look at yet another ransomware that qualifies to be in the same category. This ransomware is a sophisticated file-encrypting windows strain that i... Read more