A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

Tactical Threat Intelligence: How to shield data from advanced attacks

Struck by the reality of remote collaboration, companies had to rethink both their business strategy and their infrastructure. This led many large enterprises and public organizations to restructure their data…

Karakurt: Another Threat Actor Group on the Cyberthreat Landscape

Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…

Defend, deter, disrupt: Ending the scourge of cybercrime

How do we create more resilience to cyber risk across the economy? As the threat landscape continues to deteriorate, there has never been a more critical time to find answers…

Security experts question new DHS/TSA cybersecurity rules for rail companies

On Thursday, the Department of Homeland Security (DHS) released new rules for the US’s freight railroad and passenger rail transit industry. The rules make it mandatory for companies to have…

Cuba Ransomware Gang Hauls in $44M in Payouts

The gang is using a variety of tools and malware to carry out attacks in volume on critical sectors, the FBI warned. The “Cuba” ransomware gang has settled into a…

Computing Security Awards 2021: Heimdal™ Wins AI and Machine Learning-Based Security of the Year

On the 18th of October, we announced that Heimdal™ is a finalist at the Computing Security Awards 2021. The voting is now closed and the winners are communicated. We are very proud…

Hackers are turning to this simple technique to install their malware on PCs

Nation state-backed hacking groups are exploiting a simple but effective new technique to power phishing campaigns for spreading malware and stealing information that’s of interest to their governments.  Cybersecurity researchers at Proofpoint say…

CrowdStrike chosen by CISA for government endpoint security intiative

CrowdStrike and CISA have announced a new partnership that will see the cybersecurity company provide endpoint security for the government organization — and others — while also “operationalizing” the Executive…

VMware's Carbon Black offers more analyst assistance to respond to attacks

Leveraging its threat analysis team’s expertise and broad visibility, VMware’s Carbon Black is rolling out a new service that helps organizations respond and contain cybersecurity threats or breaches.  The new…