Verizon has today published its yearly report on business data breach investigations. Key stats included: 86 percent of data breaches…
Browsing: Malware and Vulnerabilities
Researchers at Cequence Security today published new information about a recent surge in API attacks, a major source of vulnerability that…
Multiple supercomputers across Europe have been infected with cryptocurrency mining malware and have shut down to investigate the intrusions, according to…
In response to new research from ESET on the discovery of the Ramsay malware toolkit targeting air-gapped networks, Cybersecurity experts…
It has been reported that US cybersecurity agencies have outlined the top 10 most exploited software vulnerabilities across the past 4 years. The report, authored…
Following reports from Bleeping Computer, “On April 11, 2020, Magellan discovered it was targeted by a ransomware attack. The unauthorised actor gained access…
Over the past year, the Astaroth infostealer trojan has evolved into one of today’s stealthiest malware strains, containing a slew…
The US government today released a list of the top 10 security vulnerabilities routinely exploited by foreign cyber actors between…
Are you feeling gluttonous? Bloated? Overweight? We’re not talking about your diet in the Coronavirus shutdown period, but the data…
Following reports from The Daily Swig, it was found that a security researcher has developed an leftfield technique for extracting data…