XVigil discovered a financially motivated threat actor group, dubbed Eternity, actively operating on the internet, selling worms, stealers, DDoS tools, and ransomware builders.
We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups over the last three decades.
What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to so as to avoid its theft.
Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?
Verizon Data Breach Investigation Report finds that web applications are the single most significant cause for data breaches. Learn why.
Cyber Trivia Quiz is here! Find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret
This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.
A list of the worst cybersecurity practices and strategies that could be detrimental to your organizations and alternate solutions.
The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.
Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s cyber security posture.
Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are ways to prevent data leaks.
Sign up for our Daily Cyber Brief, and be the first to receive the latest cyber news and threat alerts, from across the world.