True Protection or False Promise? The Ultimate ITDR Shortlisting Guide
Jul 10, 2024The Hacker NewsEndpoint Security / Identity Security
It's the age of identity security. The explosion of driven ransomware attacks has made CISOs and security teams realize that identity...
New Ransomware Group Exploiting Veeam Backup Software Vulnerability
Jul 10, 2024NewsroomData Breach / Malware
A now-patched security flaw in Veeam Backup & Replication software is being exploited by a nascent ransomware operation known as EstateRansomware.
Singapore-headquartered Group-IB, which discovered...
5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy
Jul 08, 2024The Hacker NewsCybersecurity / Enterprise Security
Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late June 2024 –...
New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems
Jul 08, 2024NewsroomRansomware / Encryption
An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on Windows and Linux systems.
Eldorado first appeared on March 16, 2024,...
GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks
Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack,
The malware known as GootLoader continues to be in active use by threat actors looking to deliver additional payloads to compromised hosts.
"Updates...
Webinar Alert: Learn How ITDR Solutions Stop Sophisticated Identity Attacks
Jul 05, 2024The Hacker NewsCybersecurity / Identity Protection
Identity theft isn't just about stolen credit cards anymore. Today, cybercriminals are using advanced tactics to infiltrate organizations and cause major damage...
How MFA Failures are Fueling a 500% Surge in Ransomware Losses
The cybersecurity threat landscape has witnessed a dramatic and alarming rise in the average ransomware payment, an increase exceeding 500%. Sophos, a global leader in cybersecurity, revealed in its...
Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren't protecting the infrastructure of modern business: SaaS.
SaaS continues to dominate software adoption, and it accounts for the greatest...
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Jun 26, 2024NewsroomVulnerability / Data Protection
A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the wild shortly after details of the...
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Jun 27, 2024NewsroomCyber Crime / Cyber Warfare
A 22-year-old Russian national has been indicted in the U.S. for his alleged role in staging destructive cyber attacks against Ukraine and its...