Ways Cybercriminals are Trying to Steal Your Vote
The US election is just around the corner and candidates are battling over issues that include the Supreme Court, the…
A DDoS Campaign is Extorting Businesses Posing as Fancy Bear & Lazarus Hacker Group
Recently, a new wave of attacks based around a unique form of misdirection has focused on digital extortion. In October…
The Infamous Hacker Group Maze Claims They Are Shutting Down Its Ransomware Operations
The Maze hacking gang that began operating in May of 2019 is thought to be shutting down its operations. The…
Buer Loader Grows in Popularity for Malware-as-a-Service Attackers
Most followers of malware news have certainly heard of Emotet. Emotet is part of an extensive family of malware known…
Ghimob Malware Can Spy & Steal Users’ Bank Details from Hundreds of Android Mobile Apps
Brazil-based hackers have recently expanded their operations worldwide with a new banking Trojan targeting Android users in multiple Latin American…
RansomExx Ransomware Expands its Reach to Linux Machines and Attacks Brazilian Courts
In November of 2020, RansomExx was involved in the attacks against Brazil's Superior Court of Justice. Also, the RansomExx ransomware…
How Employee Error & Negligence Can Compromise Your Business’s Cyber Security
Human error can be devastating to your company's cybersecurity. Despite modern security solutions and corporate policies, employees still make many…
The 5 Most Notorious Organized Hacking Groups
Nowadays, international cybercrime gangs model their operations after legitimate business organizations. Security analysts even claim they are giving their newer…
Paying a Ransom May Not Stop Ransomware Gangs from Leaking Stolen Data & Re-Extorting Victims
Ransomware groups know that their shady tactics are very effective in targeting larger enterprises. This has resulted in a 31%…
More Than 25 Ransomware-as-a-Service Groups are Forming Partnerships with Criminal Affiliates
Ransomware-as-a-service (or RaaS gangs) are creating new affiliations to split profits obtained in outsourced ransomware attacks that target high profile…