Ransomware

How Can Companies Defend Against Scattered Spider's Threat?
Identity & Access Management How Can Companies Defend Against Scattered Spider's Threat?

The cybercriminal group known as Scattered Spider poses an increasingly potent threat as it diversifies its targets across various industries using refined phishing and ransomware tactics. This shifting landscape is underscored by the revelation of over 500 phishing domains assimilated into their

Urgent Need for Patching SimpleHelp Against Ransomware Threats
Endpoint & Device Security Urgent Need for Patching SimpleHelp Against Ransomware Threats

In an alarming revelation, the Cybersecurity and Infrastructure Security Agency (CISA) has exposed a critical flaw in SimpleHelp's Remote Monitoring and Management (RMM) tool that offers an enticing opportunity for ransomware schemes. This vulnerability, identified as CVE-2024-57727, impacts all

Anubis RaaS: How Does Its Data Wiper Intensify Threats?
Endpoint & Device Security Anubis RaaS: How Does Its Data Wiper Intensify Threats?

Underneath the complex web of the cyber world lies a new threat—one that not only steals but irreversibly wipes data. Anubis, a formidable player in the ransomware-as-a-service (RaaS) arena, has raised alarms with its striking ability to eradicate data, leaving victims in a quandary. This menace

Retailers Battle Rising Cyberattacks, Safeguard Shopper Data
Malware & Threats Retailers Battle Rising Cyberattacks, Safeguard Shopper Data

In today's digital age, cybersecurity has become an essential concern for businesses and consumers alike. Rupert Marais, a seasoned expert in cybersecurity, lends his insights into the increasing wave of cyberattacks impacting major retailers worldwide. From understanding how these attacks unfold

Fog Ransomware Attack Exploits Legitimate Tools in Asia
Malware & Threats Fog Ransomware Attack Exploits Legitimate Tools in Asia

In an unsettling turn of events, the Fog ransomware attack deployed a sophisticated combination of legitimate software tools to infiltrate a financial institution in Asia in May 2025. This highlighted a concerning evolution in cyberattack strategies. The attack leveraged benign employee monitoring

How Vulnerable Is Your Backup Software to Remote Attacks?
Malware & Threats How Vulnerable Is Your Backup Software to Remote Attacks?

In an era where data is both invaluable and vulnerable, the security of backup software is pivotal. Recent revelations highlight just how susceptible backup solutions can be, particularly when they aren't updated promptly. Recent patches released by Veeam—a dominant player in the backup software

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later