logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 29

Read more

US Dismantles Warzone RAT Malware Operation

February 13, 2024 / 32 / 0
[ad_1] An international policing operation led by the US has enabled the dismantling of a nefarious malware operation dubbed “Warzone,” according to the Department of Justice (DoJ). Warzone is described by the DoJ as a “sophisticated remote access Trojan” (RAT) capable of enabling cybercriminals to... Continue reading
Read more

Malicious Campaign Impacts Hundreds of Microsoft Azure Accounts

February 13, 2024 / 38 / 0
[ad_1] Cybersecurity firm Proofpoint has observed a new malicious campaign targeting dozens of Microsoft Azure environments. Threat actors have targeted hundreds of individuals with multiple operational and executive roles across different organizations. These include sales directors, account managers, finance managers, vice presidents, presidents, chief financial... Continue reading
Read more

China Targets US Hacking Ops in Media Offensive

February 12, 2024 / 39 / 0
[ad_1] China has escalated its media campaign alleging US hacking operations, following condemnation from the US, UK and EU in July 2021 over Chinese cyber activities. According to a report published by cybersecurity experts at SentinelLabs today, this offensive strategy involves cooperation between Chinese cybersecurity... Continue reading
Read more

Sophisticated Cyber-Attack Hits Islamic Charity in Saudi Arabia

February 12, 2024 / 86 / 0
[ad_1] An Islamic charitable non-profit organization based in Saudi Arabia has been the target of a prolonged cyber-espionage campaign. The campaign began in May 2023 and involved sophisticated tactics employed by an unidentified threat actor. According to a new advisory by cybersecurity firm Talos, the... Continue reading
Read more

US Offers $10m Reward for Hive Ransomware Leaders

February 12, 2024 / 84 / 0
[ad_1] The US government has offered a reward of up to $10m for information leading to the identification and/or location of leaders of the Hive ransomware group. The Department of State also said it will pay up to $5m for information that leads to the... Continue reading
Read more

La Colline Cyberattack: LockBit Strikes Beauty Brand

February 12, 2024 / 75 / 0
[ad_1] La Colline, the renowned Swiss Riviera Beauty Treatment brand, has allegedly fallen victim to a cyberattack claimed by the infamous LockBit ransomware group. The threat actor behind the La Colline cyberattack issued a ransom ultimatum, setting a deadline for March 3, 2024, threatening to... Continue reading
Read more

Taking Advantage Of Missed Network Security Opportunities

February 12, 2024 / 79 / 0
[ad_1] By Erez Tadmor, Network Security Evangelist, Tufin The beginning of the year typically offers a time for reflection. To look back and see what was successful – and what might need some additional attention. This process is of extra significance to those in the... Continue reading
Read more

Could your favorite speech-to-text app be a privacy risk?

February 11, 2024 / 56 / 0
[ad_1] Privacy Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. 03 Jan 2024  •  , 4 min. read Software that swiftly and effortlessly converts spoken words into written text has been a... Continue reading
Read more

How to locate your missing devices and more

February 11, 2024 / 148 / 0
[ad_1] How To Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy 04 Jan 2024  •  , 6 min.... Continue reading
Read more

Cybersecurity trends and challenges to watch out for in 2024

February 11, 2024 / 53 / 0
[ad_1] Video What are some of the key cybersecurity trends that people and organizations should have on their radars this year? 05 Jan 2024 As 2024 dawns, it’s time to look ahead to the challenges that are set to face people and organizations across the... Continue reading
Next Page »

Search