New Meduza Infostealer Designed for Windows Collects Users’ and Systems` Data
Security researchers discovered a new Windows-based data-stealing malware dubbed Meduza Stealer. The new info stealer allegedly has detection-evading features and…
Security researchers discovered a new Windows-based data-stealing malware dubbed Meduza Stealer. The new info stealer allegedly has detection-evading features and…
In this post, I will show you the role of artificial intelligence in cybersecurity. In an increasingly interconnected world, where…
The Russian-based threat group LockBit targeted the Port of Nagoya in a ransomware attack. Japan’s largest port is currently unable…
In today’s interconnected world, where cyber threats loom large, the traditional password-based authentication method has shown its limitations and ceased…
XDR as a technology was developed as an improvement over EDR. EDR itself was conceptualized based on a real need…
The US Cybersecurity and Infrastructure Security Agency (CISA) added 6 flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog.…
Cybersecurity researchers recently published an advisory on the evolution of POWERSTAR backdoor malware and advanced spear-phishing techniques used by Charming…
EXECUTIVE SUMMARY: In businesses across the globe, a post-pandemic explosion of connectivity has massively expanded digital footprints. Intellectual property, customer…
A third-party security breach at the Department of Health and Human Services (HHS) may have exposed the personal information of…
ChatGPT increases the risk of cyberattacks. By Markus Cserna, CTO, cyan Digital Security The whole world looks with amazement and…