What the Log4Shell Bug Means for SMBs: Experts Weigh In

An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. News of…

Karakurt: Another Threat Actor Group on the Cyberthreat Landscape

Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…

REvil/Sodinokibi Ransomware: Origin, Victims, Prevention Strategies

This post is also available in: Danish Cyberattacks have become a part of our reality, but have you ever wondered what might happen if your company gets targeted? You probably…

‘Karakurt’ Extortion Threat Emerges, But Says No to Ransomware

The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September. There is a new financially motivated threat…

8 tips to protect company data sent via home internet connections

The U.S. is on track to break the single-year data breach record in 2021, according to the Identity Theft Resource Center (ITRC). That’s not even the whole story. For every…

IKEA Hit by Email Reply-Chain Cyberattack

IKEA, king of furniture-in-a-flat-box, warned employees on Friday that an ongoing cyberattack was using internal emails to malspam malicious links in active email threads. As of Friday – as in,…

Essential Microsoft EDR Tools

EDR (Endpoint Detection and Response) should be an essential part of any great cybersecurity strategy. Endpoint security is critical for any company since most of the successful breaches originate on…

Consent phishing: How attackers abuse OAuth 2.0 permissions to dupe users

When cybercrime historians look back on the first half of the 21st century, they will undoubtedly point to phishing as the most successful, and therefore, the most prevalent technique used…

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

The simplest way to stop malicious code from infiltrating your network is by automatically blocking it before it even enters the system. A straightforward and efficient way to achieve that…