Generative Data Intelligence

Tag: Threat Post

Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management

Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today’s dynamic IT environment demands an advanced vulnerability...

China-linked APT Flew Under Radar for Decade

Evidence suggests that a just-discovered APT has been active since 2013. Researchers have identified a small yet potent China-linked APT that has flown under the...

State-Sponsored Phishing Attack Targeted Israeli Military Officials

Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli government officials. An advanced persistent threat group, with ties to Iran, is believed...

Ransomware Risk in Healthcare Endangers Patients

Ryan Witt, Proofpoint’s Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care. In the last two years, COVID-19 has occupied healthcare...

DragonForce Gang Unleash Hacks Against Govt. of India

In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India. According to...

Travel-related Cybercrime Takes Off as Industry Rebounds

Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists. Researchers are warning a post-COVID upsurge...

In Cybersecurity, What You Can’t See Can Hurt You

The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders...

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

Attackers gained access to private account details through an email compromise incident that occurred in April. Kaiser Permanente suffered a data breach due to email...

Linux Malware Deemed ‘Nearly Impossible’ to Detect

Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access. A new...

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

Researchers demonstrated a possible way to track individuals via Bluetooth signals. Researchers warn Bluetooth signals can be used to track device owners via a unique...

U.S. Water Utilities Prime Cyberattack Target, Experts

Environmentalists and policymakers warn water treatment plants are ripe for attack. Industrial controls governing water-related U.S. critical infrastructure are woefully under-estimated as cyberattack targets. The...

Potent Emotet Variant Spreads Via Stolen Email Credentials

The dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?