Ghimob Malware Can Spy & Steal Users’ Bank Details from Hundreds of Android Mobile Apps
Brazil-based hackers have recently expanded their operations worldwide with a new banking Trojan targeting Android users in multiple Latin American…
RansomExx Ransomware Expands its Reach to Linux Machines and Attacks Brazilian Courts
In November of 2020, RansomExx was involved in the attacks against Brazil's Superior Court of Justice. Also, the RansomExx ransomware…
How Employee Error & Negligence Can Compromise Your Business’s Cyber Security
Human error can be devastating to your company's cybersecurity. Despite modern security solutions and corporate policies, employees still make many…
The 5 Most Notorious Organized Hacking Groups
Nowadays, international cybercrime gangs model their operations after legitimate business organizations. Security analysts even claim they are giving their newer…
Paying a Ransom May Not Stop Ransomware Gangs from Leaking Stolen Data & Re-Extorting Victims
Ransomware groups know that their shady tactics are very effective in targeting larger enterprises. This has resulted in a 31%…
More Than 25 Ransomware-as-a-Service Groups are Forming Partnerships with Criminal Affiliates
Ransomware-as-a-service (or RaaS gangs) are creating new affiliations to split profits obtained in outsourced ransomware attacks that target high profile…
The Rise of APTs
The Rise of APTs Advanced persistent attacks (APT) use continuous, stealthy, and clever hacking techniques to gain access to a…
Cerber “Ransomware as a Service” Quickly Became Hackers’ Favorite Ransomware Tool
The Cerber ransomware family accounted for 33% of all ransomware attacks in 2019, which has led to the rise in…
Adware and Browser Hijacking is Becoming an All-Too-Common Scenario
Information-stealing malware LokiBit has added a third stage to its process of compromising systems as a way to escape detection.…
Cybersecurity Threats May Come From Inside an Organization
With the rise of telecommuting due to the COVID-19 pandemic, there has been an increase in phishing campaigns and other…