Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier?

The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe.  2020 marked a record number of cyberattacks. Cloud-based…

How to Use IP Geolocation in Threat Intelligence and Cybersecurity

Hacks, leaks, and phishing scams happen so often that they hardly register as news anymore. Just last week, Google warned of a phishing scam perpetrated by Fancy Bear, a hacking…

Brazilian marketplace integrator Hariexpress exposed 1.75 billion records

At the time of publishing this article, the data was still exposed and growing as there has been no response from Hariexpress. The Brazilian E-commerce Marketplace Integrator platform Hariexpress (Hariexpress.com.br)…

Double Extorsion Ransomware: The New Normal

With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date backups and having disaster recovery plans in place, the number…

Smishing on the Rise

Smishing on the Rise A new financial crime report by risk management tool developer Feedzai has found an increase in phishing scams perpetrated via text message, a practice known as smishing. The report analyzed over…

Android flubot malware installs itself by faking security update

The security update is obviously phony but looks authentic that can deceive users into installing Flubot malware on their devices. New Zealand’s Computer Emergency Response Team (Cert NZ) has issued…

Flubot Malware Targets Androids With Fake Security Updates

The banking trojan keeps switching up its lies, trying to fool Android users into clicking on a fake Flubot-deleting app or supposedly uploaded photos of recipients. The Flubot banking trojan…

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift to provide patients remote care and telemedicine rapidly, the healthcare industry had already embraced the cloud, as well…

TA544 threat actors hit Italian firms with Ursnif banking trojan

The IT security researchers at Proofpoint have discovered a new malware campaign in which threat actors from a group called TA544 are targeting organizations in Italy with Ursnif banking trojan.…

5 Personal Cyber Security Tips

Cyber attacks are evolving, thanks to cybercriminals who are equipping themselves with new skills and capabilities – In this scenario, from business to an unsuspecting internet user; learning about cyber…