Attack

Is Deutsche Bank Ignoring Severe Security Breaches?
Infrastructure & Network Security Is Deutsche Bank Ignoring Severe Security Breaches?

Deutsche Bank's recent security breach at its New York data center has sparked significant concerns about the institution’s internal safeguards and accountability measures. This issue came to light through a lawsuit filed by James Papa, a former manager at Computacenter. The lawsuit alleges t

Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?
Data Protection & Privacy Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?

A novel technique called "Bring Your Own Installer" (BYOI) has emerged to bypass Endpoint Detection and Response (EDR) protections, specifically targeting SentinelOne's tamper protection. This method enables cybercriminals to disable EDR agents, paving the way for deploying

Black Kingdom Ransomware – A Review
Malware & Threats Black Kingdom Ransomware – A Review

The world of cybersecurity faces relentless threats from increasingly sophisticated ransomware attacks, with the Black Kingdom ransomware emerging as a prominent and dangerous adversary. This malevolent software gained notoriety by targeting Microsoft Exchange servers, illustrating a significant

Are State-Backed Hackers Exploiting Unpatched Windows Flaw?
Malware & Threats Are State-Backed Hackers Exploiting Unpatched Windows Flaw?

Since 2017, a critical unpatched Microsoft zero-day vulnerability has been exploited by at least 11 state-sponsored threat groups worldwide, impacting Windows shortcut (.lnk) files. This flaw, identified as ZDI-CAN-25373 by Trend Micro's Trend Zero Day Initiative, allows attackers to execute

Trend Analysis: Ransomware Defenses in Healthcare
Malware & Threats Trend Analysis: Ransomware Defenses in Healthcare

Healthcare systems are increasingly vulnerable to ransomware attacks, a cyber threat that encrypts organizational data and demands ransom for decryption. This threat has escalated recently, presenting significant challenges to healthcare providers who are reliant on digital networks and patient

How Are Attackers Exploiting Windows Task Scheduler Flaws?
Malware & Threats How Are Attackers Exploiting Windows Task Scheduler Flaws?

Rupert Marais, our in-house Security specialist, brings extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we delve into the multifaceted vulnerabilities discovered in the Windows task scheduling service, a critical component frequently

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later