Ransomware Prevention Guide: What You Need to Know

Ransomware is a type of malware (malicious software) that encrypts all data on a computer or mobile device, preventing the owner from accessing it. Following the infection, the victim receives…

Egregor Ransomware Analysis: Origins, M.O., Victims

A new year brings about countless new opportunities, but also, unfortunately, the chance for old threats to make a comeback and evolve. Such is the case with Egregor ransomware. Since…

Have I Been Pwned Receives 585 M Passwords from the UK Government

The service that allows users to verify if their login data was made public, named Have I Been Pwned (HIBP), has been recently helped to expand their database of passwords…

Karakurt: Another Threat Actor Group on the Cyberthreat Landscape

Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

All You Need to Know About DNS Spoofing to Keep Your Organization Safe

This post is also available in: Danish The DNS in and of itself has never been secure. Being created in the 1980s when the Internet was a complete novelty, protection…

Acer Data Breach Impacts the Company’s Indian Systems

An Acer data breach on the company’s Indian after-sales services has been confirmed by the Taiwan-based multinational hardware and electronics enterprise. Who Is Behind the Acer Data Breach? According to…

Undercover FBI Agent Reveals Espionage Plans of Nuclear Engineer

Following the sell-out of data related to nuclear-powered warship design to an undercover FBI agent, a nuclear engineer together with his wife were imprisoned, being charged with espionage accusations that…

What is Spear Phishing? Definition, Examples, Prevention Strategies

What is spear phishing, you ask? Long story short, it’s a phishing technique that plays on the victim’s trust or, rather his gullibility. Spear phishing attacks are surgical, while general…

Insider Threat. Definition, Types, Examples and Prevention Strategies

You might think that you’re taking all security measures to protect your company, but have you ever considered that the danger might come from within? Insider threat is a very…