Cloud Storage buckets holding sensitive information vulnerable to ransomware attacks

Cloud Storage buckets holding sensitive information vulnerable to ransomware attacks
Cloud storage has become an essential tool for businesses and individuals alike to store vast amounts of data, ranging from ...
Read more

Technical Tips to Evade AI-Based Cyber Threats

Technical Tips to Evade AI-Based Cyber Threats
As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly ...
Read more

Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure

Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure
The cybersecurity company empowering MSPs to secure small businesses identified a highly sophisticated Microsoft 365 tenant brand manipulation and disrupted ...
Read more

FBI alerts Gmail users over Medusa Ransomware

FBI alerts Gmail users over Medusa Ransomware
The FBI, America’s federal law enforcement agency, has issued an urgent warning to all Gmail users about an ongoing hacking ...
Read more

Cyber Attack News: Top Headlines Trending on Google

Cyber Attack News: Top Headlines Trending on Google
Malware Impersonating Booking.com Targets Hospitality Sector Microsoft Threat Intelligence researchers have been tracking a cybercriminal group targeting the hospitality industry. ...
Read more

High Stakes, Hidden Costs: Examining the Fallout of the U.S. Disbanding Its Public-Private Cyber Alliances

High Stakes, Hidden Costs: Examining the Fallout of the U.S. Disbanding Its Public-Private Cyber Alliances
By Matthew DeChant, CEO of Security Counsel In late January, two days into the new administration, the Department of Homeland ...
Read more

Insight Partners, VC Giant, Falls to Social Engineering

Insight Partners, VC Giant, Falls to Social Engineering
NEWS BRIEF Insight Partners, the venture capital fund that has investments in multiple cybersecurity firms, has confirmed a data breach. ...
Read more

Zero Trust Architecture a priority to President Donald Trump

Zero Trust Architecture a priority to President Donald Trump
Nearly six months ago, the Western media began to highlight growing concerns about potential Chinese interference in critical U.S. infrastructure. ...
Read more

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms
North Korea-linked threat groups are increasingly using living-off-the-land (LotL) techniques and trusted services to evade detection, with a recent Kimsuky ...
Read more

How to thwart cyber attacks on connected cars

How to thwart cyber attacks on connected cars
The rise of connected cars, equipped with internet connectivity, advanced sensors, and integrated technologies, has revolutionized the automotive industry, offering ...
Read more