Source Link While businesses are busy trying to protect themselves against ransomware attacks that…
Tag:
compromise
-
-
Source Link The malware loader known as Bumblebee is being increasingly co-opted by threat…
-
-
Source Link While ransomware and business email compromise (BEC) are leading causes of security…
-
Source Link The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated…
-
Malware
QBot Malware Exploiting Windows Calculator to Compromise Devices
by Deeba Ahmedby Deeba AhmedSource Link According to researcher “ProxyLife” on Twitter, QBot malware, aka QakBot, has been…
-
Network SecuritySecurity
Attackers compromise 94% of critical assets within four steps of initial breach
by Michael Hillby Michael HillSource Link New research from XM Cyber analyzing the methods, attack paths, and impacts…
-
Network SecuritySecurity
INTERPOL and Nigerian Police bust business email compromise ring, arrest 11
by Michael Hillby Michael HillINTERPOL and the Nigerian Federal Police today announced the arrests of 11 business email…