Generative Data Intelligence

Tag: malicious domains

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android...

Top News

WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive

PRESS RELEASESEATTLE – Oct. 4, 2023 – WatchGuard® Technologies, a global leader in unified cybersecurity, today announced the findings of its latest Internet Security Report, detailing...

New York Times Spoofed to Hide Russian Disinformation Campaign

A Russian disinformation campaign has been found spreading fake articles posing as legitimate stories from major media outlets, such as The Washington Post and...

WatchGuard Threat Lab Report Reveals New Browser-Based Social Engineering Trends

SEATTLE – June 28, 2023 – WatchGuard® Technologies, a global leader in unified cybersecurity, today announced the findings of its latest Internet Security Report, detailing the...

Fast-track graph ML with GraphStorm: A new way to solve problems on enterprise-scale graphs | Amazon Web Services

We are excited to announce the open-source release of GraphStorm 0.1, a low-code enterprise graph machine learning (ML) framework to build, train, and deploy...

Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains

SANTA CLARA, Calif., April 20, 2023 /PRNewswire/ -- Infoblox Inc. the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection,...

Trust Wallet Comes Clean On Rumors Regarding $4 Million ‘Hack’

Multichain cryptocurrency wallet provider, Trust Wallet, has cleared the air around a mysterious $4 million theft from its user’s account. Rumors about the theft...

Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks

Business email compromise (BEC) has become one of the most popular methods of financially motivated hacking. And over the past year, one group in...

Azuki Twitter Account Hacked, Attacker Drains Over $750K in 30 Minutes

An abrupt hostile takeover of the gold-checked Azuki Twitter account led to some users falling for yet another wallet-draining scam on Friday.In less than...

Threat Intelligence Through Web Scraping

Threat intelligence plays a key role in the safety and security of any organization’s online activity, and it plays a determining factor in upholding...

Iranian APT Targets US With Drokbk Spyware via GitHub

A subgroup of the state-backed Iranian threat actor Cobalt Mirage is using a new custom malware dubbed "Drokbk" to attack a variety of US...

How Do I Use the Domain Score to Determine if a Domain Is a Threat?

Question: What is the importance of a domain score when determining whether a domain is a threat?Dave Mitchell, CTO, Hyas: Did you know over...

Report: Air-Gapped Networks Vulnerable to DNS Attacks

Common misconfigurations in how Domain Name System (DNS) is implemented in an enterprise environment can put air-gapped networks and the high-value assets they are...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?