Warlock Ransomware Group Augments Post-Exploitation Activities
In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
Für den Schutz sensibler Gesundheitsdaten ist die Verwendung sicherer Software-Produkte notwendig. Die IT-Sicherheit von Software-Produkten im Gesundheitswesen ist allerdings ausbaufähig. Das stellt das BSI nach der Testung der Standardkonfiguration unterschiedlicher Software-Produkte im Gesundheitswesen fest.
Researchers uncovered an extensive cyber espionage campaign that used novel backdoors and familiar evasion techniques to maintain persistent access to regional targets.
Dozens of updated, malicious GlassWorm extensions have infested Open VSX, threatening software development supply chains.
Discover how Franz Regul, former CISO for the Paris 2024 Olympics, tackled unique cybersecurity challenges to protect the Games from evolving threats.
A social engineering campaign impersonating PayPal and Amazon uses customer support interactions to acquire sensitive info.
Here are the February 2026 IFPA winners for Player of the Month and Biggest Movers: Player of the Month: Viggo Löwgren from Furulund, Skå, Sweden (379.25 WPPR’s – MAIN) Elyza Brillantes from Denver, CO (235.55 WPPR’s – WOMEN’S) Biggest Movers: Alex Ballou from Virginia Beach, VA (+43,141 spots) Amanda Case from Cleveland, OH (+35,631 spots) […]
sponsored blog post Legends players, Week 6 is here – time to keep the competition rolling! Season 2 continues with a fresh mix of exciting gameplay, challenging tables, and leaderboard action. Compete from your Legends 4K™, HDP™, or HD Pinball device and climb the ranks for your chance to win AtGames Gift Card rewards. This […]
The excitement around Cisco’s latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked potential hazards.