Hunters International Dumps Ransomware, Goes Full-on Extortion

One of the most prolific ransomware-as-a-service (RaaS) groups of the past couple of years has renounced the ransomware label and says it will focus solely on data exfiltration and extortion going…
New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

Clickjacking, also known as UI redressing, is a known social engineering technique. By tricking users into clicking on a seemingly innocuous UI element, such as a button, on an attacker-controlled…
Chinese Air Fryers May Be Spying on Consumers, Which? Warns

IoT devices have become a known attack vector in recent years, largely due to the fact that they lack many of the security protections internet-facing devices are meant to have. However, even with…
Satellites found exposing unencrypted data

A research team has discovered that many satellite communications are not encrypted, potentially exposing sensitive data to interception. The findings highlight the need for improved security in the…
Scattered Spider snared financial orgs before targeting shops in Britain, America

The threat group known as Scattered Spider, which recently targeted retailers in the UK and US, had previously honed its skills attacking financial institutions and cryptocurrency exchanges.The group…
Data Destruction: The Final Line of Defense Against Cyber Attacks

In any cybersecurity plan, it is important to have a robust inventory of all the data in your enterprise’s possession, with knowledge of where it’s stored, who it impacts, and what measures are in…
Don’t Be the Easy Target: Top Cybersecurity Mistakes Companies Make (and How to Avoid Them)

When considering the subject of cybersecurity, there are several errors that are common for enterprises and organizations to fall into. In order to have an accurate view of what has to be done to…
Tech stack uniformity has become a systemic vulnerability

In the past few years the cyber-security world has observed more threats that affect operations at a global scale, including the Log4J vulnerability of 2022, the MoveIt vulnerability of 2023, and the…
Don’t panic and other tips for staying safe from scareware

For both individuals and enterprises, fear is quite a reasonable reaction to the discovery of a compromise. Malware on a computer can in fact do serious damage. However, the reaction of fear is…
When Spear Phishing met Mass Phishing: Attackers Starting to use Spear Phishing Tactics in Bulk Phishing Campaigns

Analysts typically distinguish between large scale, low effort generic social engineering attacks, bulk phishing, and highly calibrated, high effort social engineering targeting a much smaller…