Network SecurityHackers exploiting vulnerabilities at higher rates, reports VerizonStolen credentials still make up most common threat vector in annual cybersecurity report.
RansomwareFog ransomware notes troll with DOGE references, bait insider attacksRecent Fog samples are spread through phishing emails referencing pay adjustments.
RansomwareBulletproof hosting provider Proton66 steps-up malware campaignsResearchers advise security teams to block sources of bulletproof hosting.
Security OperationsNew research reveals flaws in security team performance metrics IDC's survey of 900 security leaders reveals widespread use of volume-based metrics for team performance. How do we shift from measuring activity to measuring true impact?
Vulnerability ManagementAlarms sound over attacks via Microsoft NTLM vulnerabilityAttacks targeting government and contractor companies in Poland and Romania via NTLM exploit.
RansomwareInterlock ransomware evolves tactics with ClickFix, infostealersThe lesserknown ransomware group uses fake updaters on compromised sites to lure victims.
Critical Infrastructure SecurityChina’s allegation that NSA hacked Asian Winter Games draws suspicionExperts say companies need to step up cybersecurity during ongoing U.S.-China tensions.
Cloud SecurityHow to plan your cloud migration with security in mindTo protect your cloud-based assets, your organization must consider security and compliance when planning your cloud migration journey.
RansomwareBlack Basta chat leaks reveal details on ransomware infrastructureIn addition to the insight into the Black Basta, report shows Clop had nearly 400 victims in Q1.
Threat IntelligenceBlack Basta-like Microsoft Teams phishing leads to novel backdoorA new PowerShell backdoor and persistence technique that hijacks TypeLib were discovered.
Proactive law enforcement takedowns in 2024 reshaped the cybercrime ecosystemDon Smith December 30, 2024