Dissecting the malicious arsenal of the Makop ransomware gang
Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from a recent…
Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from a recent…
Government entities and large organizations have been targeted by an unknown threat actor by exploiting a security flaw in Fortinet…
The latest annual FBI report on the state of cybercrime has shown a massive increase in the amount of money…
By Microsoft Security Across the domestic and international stage, nation-state actors are increasingly using sophisticated influence operations to distribute propaganda…
Researchers studied videos of great apes spinning and found that the animals are deliberately getting dizzy; the team believes that…
A recently discovered Golang-based botnet, dubbed GoBruteforcer, is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services Researchers from…
What to Do If Your Phone Is Lost or Stolen IdentityIQ Losing your phone can feel like the end of…
Sure, The Last of Us season one finale aired the same night as the Oscars, but that didn’t stop fans…
Evil Dead Rise is creeping out of the haunted basement and into theaters next month, but—much like the 2013 Evil…
US CISA added remote code execution vulnerability in Plex Media Server to its Known Exploited Vulnerabilities Catalog. U.S. Cybersecurity and…