Please turn on your JavaScript for this page to function normally.
malware
Multi-payload Gootloader platform stealthily delivers malware and ransomware

The delivery method for the six-year-old Gootkit financial malware has been developed into a complex and stealthy delivery system for a wide range of malware, including …

Cybercriminals continue to target trusted cloud apps

The majority of all malware is now delivered via cloud applications, underscoring how attackers increasingly abuse popular cloud services to evade legacy security defenses …

attacks
Massive rise in threats across expanding attack surfaces

There was a massive increase in cyber threats globally year-over-year fueled by both the pandemic and expanding attack surfaces, Skybox Security reveals. Expanding attack …

hand
Attackers disrupting COVID-19 efforts and critical supply chains

Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic, IBM …

Mask
10 COVID-19-related lessons for future-ready cybersecurity

In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …

biohazard
Malware increased by 358% in 2020

A research study conducted by Deep Instinct reports on the hundreds of millions of attempted cyberattacks that occurred every day throughout 2020 showing malware increased by …

shield
5 cybersecurity trends MSPs must address in 2021

2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is …

risk
People are often the collateral damage of attacks on corporations

Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from …

MITRE ATT&CK
Three ways MITRE ATT&CK can improve your organizational security

There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as …

Linux
Linux malware backdoors supercomputers

ESET researchers discovered Kobalos, a malware that has been attacking supercomputers – high performance computer (HPC) clusters – as well as other targets such as a …

ransomware
SMB ransomware extortion: Identifying pieces of the puzzle

2020 saw a new trend emerge: ransomware victims who were unwilling or unable to pay the ransom were faced with the threat of their sensitive information being exposed. Ponying …

laptop
The first step in protecting ourselves is realizing that there’s a lot we can do to stay safe online

While the shift to a digital-first life was brought on by the global pandemic, U.S. consumers plan to keep it up – with online banking (61%), social engagements (56%), and …

Don't miss

Cybersecurity news