What is file sharing security?
To remain competitive and operate at their optimum, businesses must be agile while staying secure. […]
To remain competitive and operate at their optimum, businesses must be agile while staying secure. […]
Experts have uncovered a threat operator infecting dedicated industrial control systems (ICS) to build a botnet using password crunching software designed for programmable logic controllers (PLCs). […]
Read More… from Industrial control systems infected with malware
Ransomware has become an increasingly popular form of attack for threat operators in recent years. So much so that many cybercriminal gangs have switched out credential stealing, data theft and other forms of attack and transformed into ransomware operations for the lucrative rewards they can offer. […]
Multifactor authentication (MFA) is a recommended method for safeguarding secure information protected by passwords. MFA adds an extra layer of protection that can mitigate date leaks and breaches by, making it more difficult for an intruder to access areas requiring credentials to enter. […]
Read More… from Three types of multifactor authentication explained
The already high number of organisations paying out following ransomware attacks is increasing. This continuing spike has prompted the UK’s Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC) to ask solicitors in Britain to remind the clients they serve that giving in to the demands of ransomware gangs will not keep their […]
A recent data leak at the leading comic book reading platform known as Mangatoon has now resulted in private information belonging to 23 million users being exposed. […]
Read More… from Japanese comic book application suffers extensive data breach
Email is a flexible and dependable communication solution that is easy to use, but it is often preyed upon by threat actors. Cybercriminals of all kinds are well aware that email accounts and the messages they retain, receive and send can be loaded with private information. As a result, infiltrating accounts and intercepting messages are […]
Read More… from Six security features all enterprise email requires
It has been revealed that an NPM-based supply-chain attack that dates back to December last year employed multiple malevolent NPM modules that contained hidden JavaScript code to attack hundreds of downstream applications for desktop and enterprise websites. […]
Read More… from Supply-chain attack affects hundreds of apps and websites
Recent reports form the BBC have detailed that social media accounts belonging the British Army were hijacked by threat operators and abused to promote cryptocurrency and non-fungible token (NFT) schemes to their followers on Twitter and YouTube. As part of the takeovers, videos were posted that featured the image of SpaceX founder, Elon Musk. Accounts […]
Credential theft is a common malicious activity of modern threat operators. Using tactics like social engineering, spoof attacks and phishing emails, operators create cunning ploys to part users from the passwords and usernames they use to access private information. […]
Read More… from What can threat operators do with stolen credentials?
Raccoon Stealer, a type of malware designed to illegally obtain passwords, has come back with a vengeance. The malware has returned on hacker forums within the dark web with a new and improved version. Dubbed Racoon Stealer 2.0, the malware now offers threat operators elevated operational capacity and upgraded credential-stealing capabilities. […]
Read More… from Credential-stealing malware makes unwelcome return
Email can be a useful communication tool for firms, allowing them to keep in contact with suppliers, customers, colleagues, and contacts quickly. It can also help them share important information with detailed responses and attached files. Today’s email providers also allow accounts to be easily searched for relevant data, and to keep a record of […]
Read More… from Does your company have these email security vulnerabilities?