Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery

23/04/2024 0 Comments 0 tags

Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there’s a larger, more

Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

23/04/2024 0 Comments 0 tags

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry and

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

23/04/2024 0 Comments 0 tags

In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to

Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware

23/04/2024 0 Comments 0 tags

The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The post-compromise tool, which is said

U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse

23/04/2024 0 Comments 0 tags

The U.S. Department of State on Monday said it’s taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members

Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

22/04/2024 0 Comments 0 tags

The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

22/04/2024 0 Comments 0 tags

New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. “When a

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

22/04/2024 0 Comments 0 tags

Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

22/04/2024 0 Comments 0 tags

The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion

Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

22/04/2024 0 Comments 0 tags

Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises