Malware & Threats

Why Did Russia Arrest Cybercriminal Mikhail Pavlovich Matveev Now?
Malware & Threats Why Did Russia Arrest Cybercriminal Mikhail Pavlovich Matveev Now?

The arrest of Mikhail Pavlovich Matveev by Russian law enforcement authorities has captured global attention, particularly because Matveev is a suspected cybercriminal on the FBI's most wanted list in the United States. Indicted by the US in 2023 with a $10 million reward offered for

Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities
Malware & Threats Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities

On November 21, Blue Yonder, a US-based supply chain SaaS vendor, found itself grappling with a severe ransomware attack that brought significant service disruptions to its managed services environment. Despite the concerted efforts of both internal teams and external cybersecurity firms to restore

How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?
Malware & Threats How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?

The landscape of cyber espionage is continuously evolving, with state-sponsored threat groups refining their techniques to stay ahead of defensive measures. Among the most sophisticated and persistent actors are Chinese threat groups such as Volt Typhoon, APT31, and APT41/Winnti. Over the past five

What Improvements Does Proxmox VE 8.3 Bring to Virtualization?
Malware & Threats What Improvements Does Proxmox VE 8.3 Bring to Virtualization?

Enterprise virtualization solutions are continuously evolving to meet the ever-growing demands of modern IT infrastructure, and Proxmox has been at the forefront of this dynamic landscape. The release of Proxmox Virtual Environment (VE) 8.3 introduces several enhancements and updates designed to

Weekly Cybersecurity Recap: Major Breaches, Malware, and Tech Advances
Malware & Threats Weekly Cybersecurity Recap: Major Breaches, Malware, and Tech Advances

The past week in cybersecurity has been marked by significant developments, including the exploitation of critical vulnerabilities, the discovery of new malware threats, and advancements in security tools and practices. The digital landscape continues to evolve at a rapid pace, and these recent

How Are Threat Actors Exploiting Veeam Vulnerability for Ransomware?
Malware & Threats How Are Threat Actors Exploiting Veeam Vulnerability for Ransomware?

In a recent wave of cyberattacks, threat actors have exploited a vulnerability in Veeam backup servers identified as CVE-2024-40711 to deploy a new ransomware strain known as "Frag." This exploit is part of a broader threat activity cluster named STAC 5881, which bears striking

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later