Ultimate Cyber Hygiene Guide: Learn How to Simplify Your Security Efforts

07/06/2024 0 Comments 0 tags

2023 was a year of unprecedented cyberattacks. Ransomware crippled businesses, DDoS attacks disrupted critical services, and data breaches exposed millions of sensitive records. The cost of these attacks? Astronomical. The

LightSpy Spyware’s macOS Variant Found with Advanced Surveillance Capabilities

07/06/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed that the LightSpy spyware allegedly targeting Apple iOS users is in fact a previously undocumented macOS variant of the implant. The findings come from both Huntress

Cyber Landscape is Evolving – So Should Your SCA

07/06/2024 0 Comments 0 tags

Traditional SCAs Are Broken: Did You Know You Are Missing Critical Pieces? Application Security professionals face enormous challenges securing their software supply chains, racing against time to beat the attacker

The AI Debate: Google’s Guidelines, Meta’s GDPR Dispute, Microsoft’s Recall Backlash

07/06/2024 0 Comments 0 tags

Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a responsible manner. The new guidance from the search and advertising giant is an effort

FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims

07/06/2024 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) has disclosed that it’s in possession of more than 7,000 decryption keys associated with the LockBit ransomware operation to help victims get their

SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign

07/06/2024 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called SPECTR as part of an espionage campaign

Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances

07/06/2024 0 Comments 0 tags

The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured Docker instances to deploy cryptocurrency miners for financial gain. “The

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks

06/06/2024 0 Comments 0 tags

The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. “Muhstik is a

Third-Party Cyber Attacks: The Threat No One Sees Coming – Here’s How to Stop Them

06/06/2024 0 Comments 0 tags

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors

Prevent Account Takeover with Better Password Security

06/06/2024 0 Comments 0 tags

Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for