HomeMalware & Threats

Malware & Threats

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of security and privacy challenges, as highlighted by Bitdefender and NETGEAR. A recent report, drawing data from 3.8 million homes and 50 million IoT devices, documented a staggering 9.1 billion security...

Experts say cybercrime groups are reorganizing following significant crackdowns

Cybercrime gangs are facing a challenging year, as recent global police operations have significantly impacted their operations and led to the dismantling of major groups like LockBit. Despite these setbacks, experts warn that cybercriminals are already regrouping and adopting new tactics to continue their...
spot_img

Keep exploring

Health Benefits Administrator Reports Third-Party Hack to SEC

HealthEquity, a healthcare benefits plan administrator, recently revealed that a data breach occurred due...

Trending Ransomware News on Google

Recent cyber attacks involving ransomware have been making headlines, with three significant incidents capturing...

GootLoader Malware Remains Active, Releases New Versions for Increased Attacks

GootLoader, a notorious malware loader tied to the Gootkit banking trojan, has resurfaced with...

New Zealand Fitness Retailer Targeted by DragonForce Ransomware

The DragonForce ransomware group, known for using locker malware based on the leaked LockBit...

Millions of contact numbers exposed in Twilio data breach

Twilio, a leading cloud-based communication service provider, has recently encountered a security breach impacting...

Antibot4Navalny: Uncovering the agenda of disinformation efforts

The story of Olena Zelenska, the first lady of Ukraine, allegedly purchasing a $4.8...

ISMG Editors Pay Tribute to Steve King

In a recent tribute to industry veteran Steve King, managing director of CyberEd.io, a...

Airtel India refutes 370 million user data breach

Airtel, popularly known as Bharti Airtel, has firmly denied recent reports circulating in the...

Command Injection Vulnerability in Helmholz Industrial Router REX100 / MBConnectline mbNET.mini 2.2.11

CyberDanube Security Research recently uncovered a significant security issue with the Helmholz Industrial Router...

Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape

In a world where cybersecurity threats are constantly evolving, the healthcare industry faces unique...

Understanding the Risks of SaaS Data Security

The adoption of Software as a Service (SaaS) has transformed the way businesses operate,...

FBI Alert: Threats to US Renewable Energy Sector

Google recently launched a vulnerability reward program aimed at uncovering critical zero-day vulnerabilities within...

Latest articles

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of...

Experts say cybercrime groups are reorganizing following significant crackdowns

Cybercrime gangs are facing a challenging year, as recent global police operations have significantly...

Combatting Financial Crime and Achieving Business Success with KYB

Financial crimes have become a significant threat to the global financial system, compromising its...

Malware posing as generative AI tools stealing information

In the past six months, a significant increase in Android financial threats has been...
en_USEnglish