Carbanak malware returned in ransomware attacks
Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware […]
Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware […]
Cybersecurity company Resecurity has published the 2024 Cyber Threat Landscape Forecast. Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 100
Beware! Behind the face of advancing technology lies a dark underbelly – that of evolving cyber crime. Here,… The post
Google Maps now stores location data locally on your device, meaning that Google no longer has that data to turn
The threat actor UAC-0099 is exploiting a flaw in the WinRAR to deliver LONEPAGE malware in attacks against Ukraine. A threat
Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […]
The post Beyond Mere Compliance appeared first on Cyber Defense Magazine.
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […]
The post Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket appeared first on Cyber Defense Magazine.
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […]
The post Cyber Strategy Is Not a Synonym for Tech Stack appeared first on Cyber Defense Magazine.
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […]
The post Combatting Social Engineering – The Invisible Threat appeared first on Cyber Defense Magazine.
Microsoft reports that the Iran-linked APT33 group is targeting defense contractors worldwide with FalseFont backdoor. Microsoft says the APT33 (aka Peach Sandstorm,