data exfiltration

For Unbiased Evaluation, Take on Real-World Security Testing
Etay Maor | | Breach and attack simulation (BAS), cybersecurity testing, data exfiltration, lateral movement, SASE
For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness ...
Security Boulevard
Cloud Ransomware Attack: Microsoft Sees Storm-0501 As Threat
Wajahat Raja | | credential theft, Cybersecurity News, data exfiltration, Double Extortion Tactics, Hybrid Cloud Attacks, Ransomware-as-a-Service (RaaS)
Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufacturing, transportation, and law enforcement sectors in the United States (US) in a cloud ransomware attack campaign. In this article, ...
CERT-UA Reports SickSync Campaign: Data Theft Crucial Alert
Wajahat Raja | | CERT-UA, cyber attack response, Cyber Espionage, cyber threat actors, cybersecurity awareness, Cybersecurity News, cybersecurity threats, data exfiltration, data theft, information stealer, Luhansk People's Republic, Malware Detection, SickSync campaign, spear-phishing, SPECTR malware, state-sponsored-hacking, supply chain attack, SyncThing, UAC-0020, Ukraine cybersecurity, Vermin
Recently, the Computer Emergency Response Team of Ukraine cybersecurity (CERT-UA) issued a warning regarding a targeted cyber espionage campaign named SickSync, orchestrated by a group identified as UAC-0020 or Vermin. The CERT-UA ...
Knight Ransomware Attack: Businesses and Healthcare Targeted
Wajahat Raja | | Business data protection, Cyber Attack Prevention, Cyber Threats, cybercrime, Cybersecurity, Cybersecurity Measures, Cybersecurity News, data exfiltration, Double Extortion, healthcare cybersecurity, Knight ransomware, Malware Detection, Phishing Campaigns, RansomHub, ransomware as a service, ransomware attack, ransomware defense, ransomware recovery, Ransomware variants, Security Vulnerabilities, Threat Intelligence
A recent emergence in the cybercrime landscape involves a ransomware strain known as RansomHub, which has surfaced as a successor to the notorious Knight ransomware attack. Initially identified as Cyclops 2.0, Knight ...

A Deep Dive Into the Economics and Tactics of Modern Ransomware Threat Actors
The MGM Resorts breach is just one example demonstrating the crippling financial, legal and operational consequences of ransomware incidents ...
Security Boulevard
OfflRouter Malware Ukraine: Govt Network Breach Since 2015
Wajahat Raja | | Cisco Talos report, Cybersecurity concerns, Cybersecurity News, cybersecurity practices, data exfiltration, Government network breach, Infection mechanism, Malware Analysis, Offlrouter malware Ukraine, proactive cybersecurity measures, VBA macro malware
As per recent media reports, certain government networks in Ukraine have been infected with the Offlrouter malware since 2015. The Offlrouter malware Ukraine has managed to escape detection for nearly a decade ...
EU Whistleblower Act: Organizations Must Protect Whistleblowers
With the new EU whistleblower act, organizations that fail to protect whistleblowers may face fines and suffer data leaks ...
FBI Alert: Dual Ransomware Attack Surge
Wajahat Raja | | Business Continuity, cybercriminals, Cybersecurity, Cybersecurity News, data destruction, Data encryption, data exfiltration, Data loss, double encryption, Dual Ransomware Attacks, Evasion Tactics, FBI alert, ransom payments, Ransomware, threat landscape
In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...

How Machine Learning is Vital in Successful Data Exfiltration Detection
Why should a data exfiltration detection solution play a key role in your firm's cybersecurity strategy? ...

The Data Exfiltration Techniques You Need to be Aware of
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023? ...