LogRhythm Partners with The National Museum of Computing to Preserve Technological Heritage and Promote Inclusion in the Cybersecurity Industry

LogRhythm is sponsoring TNMoC to bolster engagement in computing and recently held its Customer Advisory Council and Partner Advisory Council at the museum as part of the ongoing collaboration   Bletchley Park, UK, ...

CERT-UA Reports SickSync Campaign: Data Theft Crucial Alert

Recently, the Computer Emergency Response Team of Ukraine cybersecurity (CERT-UA) issued a warning regarding a targeted cyber espionage campaign named SickSync, orchestrated by a group identified as UAC-0020 or Vermin. The CERT-UA ...

Dropbox Sign Breach: Threat Actors Access User Information

In a recent disclosure, cloud storage giant Dropbox revealed a breach affecting its digital signature service, Dropbox Sign (formerly HelloSign). The Dropbox Sign breach, identified on April 24, 2024, compromised user data, ...

Brokewell Malware: Cyber Attacks Via Fake Browser Updates

In a recent revelation by threat detection company ThreatFabric, a newly identified Android trojan named Brokewell has emerged as a significant threat to users’ security. The malicious Brokewell malware not only possesses ...

Lazarus Hacker Group Actively Exploiting Windows Kernel Flaw

The cybersecurity world is abuzz with the revelation of Lazarus Group’s exploitation of a critical vulnerability in Windows Kernel. The Windows Kernel flaw, targeting CVE-2024-21338, has raised concerns due to its potential ...

APT29 Espionage Attacks: Microsoft Issues Urgent Warning

In a recent announcement, Microsoft issued a warning regarding the increasing activities of APT29, a Russian state-sponsored cyber threat group. This group, notorious for its involvement in espionage attacks on Microsoft‘s systems ...

LinkedIn Smartlinks Attacks Target Microsoft Accounts

In the ever-evolving landscape of cybersecurity threats, hackers have once again employed a cunning strategy by exploiting LinkedIn’s Smart Links in phishing attacks, aiming to steal Microsoft account credentials. These sophisticated LinkedIn ...
Cybersecurity Awareness Month: The Evolution of Ransomware

Cybersecurity Awareness Month: The Evolution of Ransomware

This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] ...
Guardians of the Cyber Realm: Unveiling Excalibur’s Arsenal in the Battle for Digital Security!

Guardians of the Cyber Realm: Unveiling Excalibur’s Arsenal in the Battle for Digital Security!

In today’s blog post we again embark on a thrilling journey through the intricate landscapes of cybersecurity! With Excalibur as your guide, delve into the vulnerabilities of passwords, meet the valiant guardians ...
Detecting a Phishing Email: 10 Things to Watch

Detecting a Phishing Email: 10 Things to Watch

As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is ...