Home Tags Threat actors

Tag: threat actors

French Organizations on APT31 Group’s Radar

Like ransomware attacks, cyber espionage campaigns are fatal and can cause irreparable damage to enterprise IT security perimeter. Government and organizations must enforce robust...

Schneider Electric Patches 13 Vulnerabilities Affecting its EVlink Charging Stations

Schneider Electric, an energy management and automation company, has reportedly patched 13 critical vulnerabilities in its EVlink range of products. The EV product range...

These are the 5 Biggest Data Breaches in India in H1...

In November 2020, cybersecurity service provider Kaspersky had forecast an increase in the number of cybercriminal activities in India during 2021. With the wider...

Telstra Service Provider Hit with a Cyberattack; Tens of Thousands of...

Keeping a close eye on the rising number of phishing attacks on Australians amidst the COVID-19 pandemic, in September 2020, Telstra launched a pilot...

Initial Access Brokers Are Breaking Into Corporate Networks and Selling Access...

Recent research "Digital Shadows" lifts the cover on Initial Access Brokers (IABs), a fast-growing new class of cybercriminals who breach organizations, and then sell...

Fleeceware Apps Continue to Deceit Consumers; Scammers Earn S400 Mn

Cybersecurity experts discovered hundreds of fleeceware mobile applications on the Apple Store and Google Play Store tricking thousands of unwitting users into paying unnecessary...

How to Know if You’re Being Stalked by Stalkerware

At a time when everyone is more connected than ever, cybercriminals too have become more active looking for ways to turn an adverse situation...

Is Google reCAPTCHA Really Secure?

Several cybersecurity experts have reported an increase in phishing attacks using Google’s reCAPTCHA feature to hide malware and escape security detections. A research team from Zscaler recently discovered a...

Chinese Hacking Group “Hafnium” Exploiting Microsoft’s Email Software Server

Security incidents where cybercriminals exploit critical vulnerabilities of Microsoft products have become rampant in recent times. Microsoft Threat Intelligence Center (MSTIC) recently identified a...

Malware with Sandbox Evasion Abilities Trending Among Hackers

Threat actors constantly enhance their hacking skills and use innovative techniques to spread malware on targeted devices. They often use a combination of advanced...

MOST POPULAR

RECENT POSTS