cyber criminals
Bumblebee Malware Attacks: WebDAV Threat Unveiled
The frightening Bumblebee malware attacks have made a forceful return in the realm of cybersecurity, posing a major threat to organizations’ digital security. Following a brief absence, this renowned loader has reappeared ...

How to Reduce the Financial Impact of Cyberattacks to Your Business
There has been a steady stream of significant cyberattacks headlining the news since December 2020 and the Sunburst attack on SolarWinds Orion platform. Fueled by the anonymity afforded by payments made in ...

How to Reduce the Financial Impact of Cyberattacks to Your Business
There has been a steady stream of significant cyberattacks headlining the news since December 2020 and the Sunburst attack on SolarWinds Orion platform. Fueled by the anonymity afforded by payments made in ...

How to Reduce the Financial Impact of Cyberattacks to Your Business
There has been a steady stream of significant cyberattacks headlining the news since December 2020 and the Sunburst attack on SolarWinds Orion platform. Fueled by the anonymity afforded by payments made in ...
Wiper Malware Threat Looms Over Tokyo Olympics
Did you know that according to recent research by a famous Japanese Security Firm, it has been discovered that the computer systems in Japan are being attacked by destructive wiper malware? As ...
Poisoning Attempt was a Second Cyber Attack on Florida Water Plant
An article in ZDNet has revealed that Oldsmar (Florida, US) treatment plant, which was in news due to a poisoning attempt through a cyber attack, was also at the receiving end of ...

Cyber Attack Haunts a Public Water Supply System. Again!
In my previous blog, I had described how and why it is important for critical agencies to ensure that they are secure from The post Cyber Attack Haunts a Public Water Supply ...

Cyber Security for Critical Infrastructure: Challenges and Solutions
With geopolitical tension rising in certain parts of the world along with the ambitions of cyber attackers, coming up with a holistic strategy The post Cyber Security for Critical Infrastructure: Challenges and ...

Bad Actors Target MongoDB Databases, Threatening to Contact GDPR Legislators Unless Ransom is Paid
Bad actors are targeting unsecured MongoDB servers, wiping their database and leaving ransom notes outlining threats to leak the stolen information and report owners for GDPR violations. According to Victor Gevers, the ...
The FBI’s 10 Most-Wanted Black-Hat Hackers – #2
The State of Security’s countdown of the FBI’s 10 most-wanted black-hat hackers is nearly over. Just two criminals remain. At number two is Evgeniy Mikhailovich Bogachev, the leader of a cybercrime ring ...