Plato Data Intelligence.
Vertical Search & Ai.

Tag: malware

Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks

Business email compromise (BEC) has become one of the most popular methods of financially motivated hacking. And over the past year, one group in...

Top News

Why CISOs Should Care About Brand Impersonation Scam Sites

Impersonation stands at the heart of so many cybercriminal schemes today. Whether used to fuel traditional phishing or malware propagation attacks, business email compromise...

TeraWulf Announces Proposed Public Offering of Common Stock

EASTON, Md.–(BUSINESS WIRE)–$WULF #Bitcoin–TeraWulf Inc. (Nasdaq: WULF) (“TeraWulf” or the “Company”), which owns and operates vertically integrated, domestic Bitcoin mining facilities powered by more...

How Can Disrupting DNS Communications Thwart a Malware Attack?

Question: How does a threat actor utilize DNS communications in malware attacks?Dave Mitchell, CTO, Hyas: The idea that you can protect yourself from all...

Cyber Security for Law Firms Critical to Meet Ethical, Regulatory, and…

Law firms make a particularly attractive target for cybercriminals. They store confidential and highly sensitive data for numerous clients and represent...

Poser Hackers Impersonate LockBit in SMB Cyberattacks

A recent spate of cyberattacks against small to midsize businesses (SMBs) across Northern Europe was initially believed to be the handiwork of LockBit, but...

How to Store Your Crypto – 6 Alternatives to Cryptocurrency Exchanges

The recent collapse of the cryptocurrency exchange FTX was a stark reminder of the vulnerability of these platforms. As one of the...

10 Common Crypto Scams and How to Avoid Them

As with anything, whenever there is something promising going on in society, there always has to be at least one person who ruins it...

Russia’s Sandworm APT Launches Swarm of Wiper Attacks in Ukraine

Sandworm, an advanced persistent threat (APT) group linked to Russia's foreign military intelligence agency GRU, has deployed a medley of five different wipers on systems...

Convincing, Malicious Google Ads Look to Lift Password Manager Logins

Several users of Bitwarden's password management technology last week reported seeing paid ads to credential stealing phishing sites when they used Google to search...

Critical RCE Lexmark Printer Bug Has Public Exploit

A critical security vulnerability allowing remote code execution (RCE) affects more than 120 different Lexmark printer models, the manufacturer warned this week. And, there's...

SwiftSlicer: New destructive wiper malware strikes Ukraine

Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country ESET researchers have uncovered a new wiper attack in Ukraine...

3 Ways ChatGPT Will Change Infosec in 2023

ChatGPT took the world by storm after OpenAI opened it for testing on Nov. 30, 2022. For an industry calloused by years of largely...

Latest Intelligence

spot_img
spot_img
spot_img
spot_img