Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers
We have observed a sudden increase in Ransomware incidents since June 2023, involving the appending of the “.malox” file extension…
We have observed a sudden increase in Ransomware incidents since June 2023, involving the appending of the “.malox” file extension…
ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our…
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store.…
Exploit kits (Eks) are collections of exploits – pieces of code or sequences of commands – created to leverage vulnerabilities…
Phishing remains one of the most prevalent attacker techniques as a response to a continuous surge in phishing campaigns across…
Microsoft believes that Microsoft Teams chats were used into coaxing users to share their credentials with threat actors. The available…
By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has…
By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate.…
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities…
CrowdStrike is pretty reliable when it comes to protecting you from attacks. But the thing is, it can be quite…