Carbanak malware returned in ransomware attacks
Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware…
Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware…
Cybersecurity company Resecurity has published the 2024 Cyber Threat Landscape Forecast. Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 100…
Beware! Behind the face of advancing technology lies a dark underbelly – that of evolving cyber crime. Here,… The post…
Google Maps now stores location data locally on your device, meaning that Google no longer has that data to turn…
The threat actor UAC-0099 is exploiting a flaw in the WinRAR to deliver LONEPAGE malware in attacks against Ukraine. A…
Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and…
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices…
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid.…
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one…
Microsoft reports that the Iran-linked APT33 group is targeting defense contractors worldwide with FalseFont backdoor. Microsoft says the APT33 (aka…