Cybercrime

Phishing-as-a-Service Platforms – A Review
Malware & Threats Phishing-as-a-Service Platforms – A Review

A new trend is shaking up the cybersecurity landscape, with the rise of sophisticated phishing-as-a-service (PhaaS) platforms revolutionizing how cybercriminals operate. These services offer comprehensive, turnkey phishing solutions that are now easily accessible to even the least technically

Ransomware Breach Highlights Public Sector Cyber Vulnerabilities
Security Operations & Management Ransomware Breach Highlights Public Sector Cyber Vulnerabilities

Ransomware attacks are among the most notorious cyber threats facing organizations today, with public sector entities becoming prime targets. The recent attack on West Lothian Council in Scotland serves as a stark reminder of these growing vulnerabilities. In this roundup, insights from

How Do Cyberattackers Exploit EDR Vulnerabilities?
Endpoint & Device Security How Do Cyberattackers Exploit EDR Vulnerabilities?

A novel cyberattack technique named "Bring Your Own Installer" has been identified, exploiting vulnerabilities within SentinelOne's Endpoint Detection and Response (EDR) product. Uncovered by Stroz Friedberg, part of Aon, this method bypasses the EDR's anti-tamper features during system upgrades or

Cyberattack Shuts Down Operations at Leading US Steelmaker
Security Operations & Management Cyberattack Shuts Down Operations at Leading US Steelmaker

Manufacturing in Crisis: Could Cyber Intrusion Paralyze Industrial Giants? Imagine a bustling steel industry, where massive furnaces create materials crucial to infrastructure and national security, abruptly halted by a cyberattack. The incident not only impacts production but sends ripples across

Peru Denies Ransomware Claims Amid Rising Cybersecurity Threats
Malware & Threats Peru Denies Ransomware Claims Amid Rising Cybersecurity Threats

In a formidable assertion of digital resilience, Peru finds itself at the intersection of a critical cybersecurity discourse. Allegations surfaced that the Rhysida ransomware gang successfully infiltrated Peru’s governmental digital infrastructures, demanding a hefty ransom of 5 bitcoins—roughly

Are You Vulnerable to Romance Fraud Scams?
Identity & Access Management Are You Vulnerable to Romance Fraud Scams?

In recent years, romance fraud scams have evolved to become one of the most pervasive types of cybercrime, posing significant threats to individual financial security and emotional stability. This fraudulent activity involves online criminals masquerading as potential romantic partners to deceive

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later