Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks News Previously limited to initial access brokering, the Gootloader group has… rooter November 20, 2023 1 min read 0
Virtual Kidnapping: AI Tools Are Enabling IRL Extortion Scams News With AI and publicly available data, cybercriminals have the resources… rooter November 20, 2023 1 min read 0
Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises Cyber Security By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With… rooter November 20, 2023 1 min read 0
Four Years and a Pandemic Later: Have Agencies Become Cloud Smart? Cyber Security By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June… rooter November 20, 2023 1 min read 0
Locard’s Principle in Digital Forensics Security Uncovering the Footprints of Cybercrime Digital forensics is an evolving… rooter November 19, 2023 1 min read 0
Security Affairs newsletter Round 446 by Pierluigi Paganini – INTERNATIONAL EDITION Security A new round of the weekly SecurityAffairs newsletter arrived! Every… rooter November 19, 2023 3 min read 0
8Base ransomware operators use a new variant of the Phobos ransomware Security 8Base ransomware operators were observed using a variant of the Phobos… rooter November 19, 2023 3 min read 0
Israeli man sentenced to 80 months in prison for providing hacker-for-hire services Security An Israeli hacker has been sentenced to 80 months in… rooter November 18, 2023 2 min read 0
Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine Security Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm… rooter November 18, 2023 4 min read 0
Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe Security An attack against a port operator that ultimately hobbled some… rooter November 18, 2023 1 min read 0