Black Basta Ransomware Attack: Microsoft Quick Assist Flaw

Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering attacks. This ...
software supply chain malware

Courtroom Recording Software Compromised in Supply Chain Attack

Threat actors compromised a popular audio-visual software package used in courtrooms, prisons, government, and lecture rooms around the world by injecting a loader malware that gives the hackers remote access to infected ...
Security Boulevard
frustrated man

CISO Cite Human Error as Top IT Security Risk

It’s the wetware. It’s always the wetware. But that’s not the only takeaway from this year’s Voice of the CISO report ...
Security Boulevard

Backdoors and Miners Amid eScan Antivirus Backdoor Exploit

Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, ...

Introduction to Living Off the Land (LotL) Attacks

Living off the Land (LotL) attacks represent a sophisticated cyber threat strategy where attackers use legitimate tools and processes, known as LOLBins (Living Off the Land Binaries), to execute malicious activities. This ...
News

Cradlepoint Adds SASE Platform for 5G Wireless Networks

Cradlepoint, a unit of Ericsson, today launched a secure access service edge (SASE) platform for branch offices using 5G wireless services to connect to the Internet. Camille Campbell, senior product marketing manager ...
Security Boulevard
infostealer malware data

CoralRaider Group Delivers Three Infostealers via CDN Cache

The latest cyberthreat campaign by the threat actors is targeting victims around the world, Cisco's Talos unit says ...
Security Boulevard

Who Are APT29?

Russian hacker group APT29 is one of the most technically skilled and organized threat actors ...

Spammers Love Mobile Phone IP Space. Here’s How to Fix That.

Mobile phone companies are leaving the door wide open for spammers. They’re hurting their own customers (and the rest of the Internet) - but there’s still time to fix this ...