What Is Conti Ransomware?

Conti ransomware is an extremely damaging malicious actor due to the speed with which encrypts data and spreads to other systems. The cyber-crime action is thought to be led by…

Ransomware: Looking for weaknesses in your own network is key to stopping attacks

Ransomware is a major cybersecurity threat to organisations around the world, but it’s possible to reduce the impact of an attack if you have a thorough understanding of your own…

Gigabyte Allegedly Hit by AvosLocker Ransomware

If AvosLocker stole Gigabyte’s master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds. The AvosLocker ransomware gang is…

Introducing ATT&CK v10: More Objects, Parity and Features

Amy L. RobertsonOct 21 · 6 min read By Amy L. Robertson (MITRE), Alexia Crumpton (MITRE), and Chris Ante (MITRE) As announced a couple of weeks ago, we’re back with…

20+ Free Remote Desktop Software Tools You Need to Know

Remote desktop software is basically a computer program that lets you connect to another computer. The PC you will connect to is named “the host”, your PC from where you…

Russian Cyber-criminals Switch to Cloud

Russian Cyber-criminals Switch to Cloud Cybersecurity firm Kaspersky today released research on Russian-speaking cyber-criminal activity and how it has changed over the past six years. The study by Kaspersky’s Computer Incident Investigation Department found…

Asana rolls out Enterprise Work Graph for cross-team coordination

Asana’s Universal Reporting feature Asana Special feature Turning Big Data into Business Insights Businesses are good at collecting data, and the Internet of Things is taking it to the next…

Vulnerability Patched in Sassy Social Share Plugin

WordFence –  WordFence –  Note: To receive disclosures like this in your inbox the moment they’re published, you can subscribe to our WordPress Security Mailing List. In 2010, Steffan Esser…

Best VPN for torrenting 2021

BitTorrent is a complex topic. As a technology, it’s perfectly legal. But what you do with it could be illegal. Before we dive into the legalities of torrenting, let’s do…

False Government Websites Steal Private Financial Data, FBI warns

A warning comes from the FBI announcing that cybercriminals use new methods to collect financial data and personal information, making use of false websites posing as government platforms. Their goal…