News & Updates

Lancefly APT uses powerful Merdoor backdoor in attacks on Asian orgs

The Lancefly APT group is using a custom powerful backdoor called Merdoor in attacks against organizations in South and Southeast Asia. Symantec researchers reported that the Lancefly APT group is using a custom-written backdoor in attacks targeting organizations in South and Southeast Asia, as part of a long-running campaign. The highly-targeted attacks aim at organizations […]

The post Lancefly APT uses powerful Merdoor backdoor in attacks on Asian orgs appeared first on Security Affairs.

News & Updates

New ransomware gang RA Group quickly expanding operations

Researchers warn of a new ransomware threat dubbed RA Group that also engages in data theft and extortion and has been hitting organizations since late April. The group’s ransomware program is built from the leaked source code of a different threat called Babuk.

“Like other ransomware actors, RA Group also operates a data leak site in which they threaten to publish the data exfiltrated from victims who fail to contact them within a specified time or do not meet their ransom demands,” researchers from Cisco Talos said in a new report. “This form of double extortion increases the chances that a victim will pay the requested ransom.”

To read this article in full, please click here

News & Updates

Wegen Datenschutzbedenken: Immer mehr Menschen machen Schluss mit nachlässigen Unternehmen

Das Internet nimmt eine immer dominantere Rolle in unseren Leben ein und damit
steigt auch die Menge der Daten, die jeden Tag von verschiedensten Unternehmen
generiert, gesammelt und gespeichert werden beispiellos an. Egal, ob persönliche
Finanzen, Gesundheitszustand, Einkaufsgewohnheiten oder Standort, jeden Tag
landen überaus sensible Daten in den Händen von Dritten. Und immer mehr Menschen
erkennen, wie wichtig der Schutz dieser Daten vor unberechtigtem Zugriff und
Missbrauch ist.

Laut einer

News & Updates

Credential Stuffing Attacks: What They Are & How To Prevent Them

Credential Stuffing Attacks: What They Are & How To Prevent Them
IdentityIQ

Hackers can use different techniques to steal your passwords. One way they can use your stolen personal data is called credential stuffing. Read on to learn more about credential stuffing and how you can help protect yourself. What is Credential Stuffing? Credential stuffing is a cyberattack involving hackers using software to try multiple combinations of […]

The post Credential Stuffing Attacks: What They Are & How To Prevent Them appeared first on IdentityIQ written by Kristin Austin

Exit mobile version