Monthly Archives: July 2021
WildPressure APT expands operations targeting the macOS platform
Researchers from Kaspersky have spotted a new malware used by the WildPressure APT group to targets both Windows and macOS systems. The WildPressure was spotted for the first time in August 2019 […]
The Mobile Attack Pyramid
Identifying Attack Surfaces is Key to Protecting Mobile Applications By David Stewart, CEO, Approov, Inc. A regular pyramid has 5 surfaces, 4 sloping ones and another as its base. In […]
REvil ransomware gang demands $70M for universal decryptor for Kaseya victims
REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems […]
REvil gang exploited a zero-day in the Kaseya supply chain attack
Kaseya was addressing the zero-day vulnerability that REvil ransomware gang exploited to breach on-premise Kaseya VSA servers. A new supply chain attack made the headlines, on Friday the REvil ransomware […]
Discovering Unknown Botnets with Command-and-Control Communications Analysis
Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models to detect, identify, and block malicious traffic. Zscaler (my employer) processes more […]
How Various Flavors of PKI Can Protect and Secure Financial Services Data
By Abul Salek, Director of Product Management, Sectigo How much time and budget does your company allocate to cybersecurity to protect you and your customers’ critical data and private information? […]
Linux version of REvil ransomware targets ESXi VM
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware operators are now using a Linux encryptor to encrypts Vmware […]
New LinkedIn breach exposes data of 700 Million users
A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more than 92% of the total 756M users. A new massive LinkedIn breach […]
Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity framework
By Kate Orekhova, Cleveroad company Health organizations deal with a large amount of sensitive personal information. That’s why they face challenges complying with tightening regulations, and they’re constantly combating increased […]