Category: Attack

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

[ad_1] May 17, 2023Ravie LakshmananInternet of Things / Vulnerability The second generation version of Belkin's…

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered

[ad_1] May 17, 2023Ravie LakshmananCyber Espionage / Threat Intel Cybersecurity researchers have unearthed previously undocumented…

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator

[ad_1] May 17, 2023Ravie LakshmananCyber Crime / Ransomware A Russian national has been charged and…

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules

[ad_1] May 16, 2023Ravie LakshmananOnline Security / Malware The threat actors behind the CopperStealer malware…

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks

[ad_1] May 16, 2023Ravie LakshmananNetwork Security / Threat Intel The Chinese nation-state actor known as…

Secure Remote Access to All Environments

[ad_1] Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential…

Affiliates Take Home 85% of Ransom Payouts

[ad_1] May 16, 2023Ravie LakshmananCyber Crime / Ransomware Ransomware affiliates associated with the Qilin ransomware-as-a-service…

Hackers Using Golang Variant of Cobalt Strike to Target Apple macOS Systems

[ad_1] May 16, 2023Ravie LakshmananEndpoint Security / Cyber Threat A Golang implementation of Cobalt Strike…

New ‘MichaelKors’ Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems

[ad_1] May 15, 2023Ravie LakshmananLinux / Hypervisor Jackpotting A new ransomware-as-service (RaaS) operation called MichaelKors…

Why High Tech Companies Struggle with SaaS Security

[ad_1] It's easy to think high-tech companies have a security advantage over other older, more…