Phishing Espionage Attack Targets US-Taiwan Defense Conference
Hackers sent a convincing lure document, but after 20 years of similar attacks, the target organization was well prepared. Hackers…
Identity illuminated
Hackers sent a convincing lure document, but after 20 years of similar attacks, the target organization was well prepared. Hackers…
Thought to be Brazilian in origin, the remote access Trojan is the “perfect tool for a 21st-century James Bond.” Thought…
By accessing the MSSQL, threat actors gain admin-level access to the application, allowing them to automate their attacks. By accessing…
Regulators fine AT&T $13 million for failing to protect customer information held by a third-party vendor, and extend consumer data…
Despite security updates to protect data, 45% of total enterprise instances of the cloud-based IT management platform leaked PII, internal…
Criminal actors are finding their niche in utilizing QR phishing codes, otherwise known as “quishing,” to victimize unsuspecting tourists in…
Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) and IoT devices that are…
A Chinese national has been indicted in the U.S. on charges of conducting a “multi-year” spear-phishing campaign to obtain unauthorized…
Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends…
Ultimately, the goal of businesses and cyber insurers alike is to build more resilient IT environments to avoid cyberattacks and…