North Korean APT Kimsuky Uses Commodity RATs with Custom Gold Dragon Backdoor

Security experts in South Korea have discovered a new wave of activity from the Kimsuky threat actors, which includes the use of commodity open-source remote access tools delivered with their…

Romance Fraud Losses Increased by 91% During COVID-19

Women made up two-thirds of victims of romance fraud during the pandemic, according to the figures

Wireless Network Security Best Practices

A surprising number of businesses and individuals do not take the proper precautions when it comes to wireless network security. In this guide, we will cover these precautions and provide…

Why organizations need to prepare themselves for BEC attacks

Organizations face a number of different attacks across a variety of vectors, which is often why it’s so difficult for leaders to effectively secure their environment. Many attacks are carried…

This malware is reading your email 30 minutes after the first infection

Qbot, otherwise known as Qakbot or QuakBot, is an old software threat to Windows users that pre-dates the first iPhone, but it’s still being improved for nefarious efficiency.   The…

News Corp Reportedly Targeted by Chinese Hackers

A cyberattack resulting in data theft impacted News Corp, an American media and publishing enterprise extended across various domains like news media, book publishing, cable television, and real estate data.…

Vodafone Portugal 4G and 5G Services Got Shut Down

There are almost four million mobile users in Portugal, and another 3.4 million residential and business internet clients, thus the cybersecurity incident has created a significant issue on an unprecedented…

FBI warns: SIM-swapping attacks are rocketing, don't brag about your crypto online

The Federal Bureau of Investigation (FBI) is warning about a big uptick in scams using smartphone SIM swapping to defraud victims.  Subscriber Identity Module (SIM) swapping is an old trick,…

UK Foreign Office Subjected to “Serious Cybersecurity Incident”

Document published on government website revealed unidentified hackers infiltrated Foreign Office systems

Brute-forcing passwords, ProxyLogon exploits were some of 2021's most popular attack methods

Brute-forcing passwords, as well as the exploit of ProxyLogon vulnerabilities against Microsoft Exchange Server, were among the most popular attack vectors last year.  According to ESET’s Q3 Threat Report, covering…