Apple research study, data breaches, immutable storage, backup storage, ransomware data backup

Sophos: Backups are in Ransomware Groups’ Crosshairs

Enterprises that ignore their data backups, in contemplating ransomware, do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by ...
Security Boulevard
software supply chain malware

The Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code

The open source community, federal agencies and cybersecurity researchers are busy trying to get their hands around the security near-miss of the backdoor found in versions of the popular XZ Utils data ...
Security Boulevard

WordPress Sign1 Malware Infects Over 39K Sites In 6 Months

Recent media reports have revealed a malicious malware campaign that has been active for the past six months. Reports claim that the WordPress Sign1 malware has infected and compromised over 39,000 sites ...
phishing cybersecurity

‘Darcula’ PhaaS Campaign Sinks Fangs into Victims

A sprawling phishing-as-a-service (PhaaS) campaign that has been running since at least last summer is using more than 20,000 fake domains to target a wide range of organizations in more than 100 ...
Security Boulevard
operational supply chain ICS cybersecurity critical infrastructure environment climate

Industrial Enterprise Operational Technology Under Threat From Cyberattacks

One in four industrial enterprises had to temporarily cease operations due to cyberattacks within the past year, suggesting operational technology must improve ...
Security Boulevard
What is Threat Management

What is Threat Management?

Threat management is a process that is used by cybersecurity analysts, incident responders and threat hunters to prevent cyberattacks, detect cyberthreats and respond to security incidents. The post What is Threat Management? ...
vulnerability zero day

Google: Zero-Day Attacks Rise, Spyware and China are Dangers

The number of zero-day vulnerabilities that are exploited jumped in 2023, with enterprises becoming a larger target and spyware vendors and China-backed cyberespionage groups playing an increasingly bigger role, according to Google ...
Security Boulevard

Beneath the Shadows: DarkGate

Join us as we uncover DarkGate, a malevolent force that strikes fear into the hearts of organizations worldwide. DarkGate has morphed into a sophisticated adversary, utilizing Drive-by Downloads and DanaBot deployment to ...