A sophisticated cyberattack uses fake PayPal security alerts, starting with phishing emails and escalating through phone-based social engineering to install…
Read More »RDP
Entity category: technology
The DeadLock ransomware campaign uses a BYOVD technique, exploiting a known vulnerability (CVE-2024-51324) in a Baidu Antivirus driver to disable…
Read More »Kraken ransomware uniquely tests a machine's performance to choose the most efficient encryption method, allowing it to encrypt data quickly…
Read More »ProxyBridge is a free, open-source utility for Windows that routes specific application traffic through SOCKS5 or HTTP proxies, offering granular…
Read More »Self-service password reset (SSPR) solutions reduce IT support costs and improve security by allowing employees to independently handle login issues,…
Read More »Akira ransomware attacks can achieve full network encryption in as little as four hours after initial VPN access, leaving organizations…
Read More »Abuse of remote access software and services is the most common warning sign of an impending ransomware attack, as cybercriminals…
Read More »A global ransomware campaign called Warlock is exploiting a critical Microsoft SharePoint vulnerability to compromise networks, escalate privileges, and deploy…
Read More »The US government warns of escalating cyber threats from the Interlock ransomware group, which targets businesses and critical infrastructure with…
Read More »Swiss authorities confirmed a major data breach after hackers infiltrated systems at Radix, a third-party organization, exposing sensitive government data…
Read More »








