Ransomware

Trend Micro Confirms Active Exploitation of Apex One Flaws
Malware & Threats Trend Micro Confirms Active Exploitation of Apex One Flaws

We're thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a critical topic: the recently discovered security flaws in Trend Micro Apex One, a widely

DaVita Ransomware Attack Affects Nearly a Million Patients
Malware & Threats DaVita Ransomware Attack Affects Nearly a Million Patients

In a chilling reminder of the vulnerabilities plaguing the healthcare sector, a major ransomware attack struck DaVita, one of the leading providers of kidney care services, earlier this year, compromising the personal and medical data of nearly a million individuals. This incident, discovered on

SonicWall SSL VPN Vulnerability – Review
Malware & Threats SonicWall SSL VPN Vulnerability – Review

Setting the Stage for Secure Remote Access In an era where remote work has become a cornerstone of modern business operations, the demand for robust and secure access solutions has never been higher, with millions of employees relying on virtual private networks (VPNs) to connect to corporate

CISA Unveils Thorium: Free Malware Analysis Platform
Malware & Threats CISA Unveils Thorium: Free Malware Analysis Platform

What if a single tool could turn the tide against the relentless wave of cyber threats hitting enterprises every day? In a world where malware evolves at breakneck speed, the Cybersecurity and Infrastructure Security Agency (CISA), alongside the Department of Energy's Sandia National Laboratories,

Storm-2603 Deploys DNS Backdoor in Ransomware Attacks
Malware & Threats Storm-2603 Deploys DNS Backdoor in Ransomware Attacks

What happens when cybercriminals wield the stealth of spies and the greed of gangsters in a single devastating blow? A chilling wave of ransomware attacks sweeping across Latin America and the Asia-Pacific region offers a grim answer, highlighting the urgent need for stronger defenses. Storm-2603,

How Does Scattered Spider Infiltrate Critical Systems?
Malware & Threats How Does Scattered Spider Infiltrate Critical Systems?

Scattered Spider, known for targeting VMware ESXi hypervisors, poses a significant threat to critical systems within the retail, airline, and transportation sectors in North America. This sophisticated group employs campaign-driven operations focusing on social engineering tactics to bypass

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later