A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.
Recovering from cyber attacks is expensive and can compromise the sensitive Personally Identifiable Information (PII) of your business and its employees. To protect your business, your staff, and your stakeholders from the damage of malicious cyber attacks, keep in mind these 11 preventative measures....
Recovering from cyber attacks is expensive and can compromise the sensitive Personally Identifiable Information (PII) of your business and its employees. To protect your business, your staff, and your stakeholders from the damage of malicious cyber attacks, keep in mind these 11 preventative measures....
The attacks explore four separate vulnerabilities.Microsoft has known about these vulnerabilities for some timebut dubbed them low-risk. While each of these vulnerabilities on its own may indeed be perceived as medium or low risk, together they allow forprivilege escalationand the resulting mass attac...
Sekoia has provided a list of technical indicators related to the malicious network for use by professionals. This proactive approach aims to bolster defenses against future cyberattacks and mitigate the risks posed by similar malware. As France gears up for the Olympic Games, this operation undersco...
The 24 Most Recent Ransomware Attacks (to Date) in 2020 Ransomware attacks are those that usemalicious software (malware)to encrypt the data and files of targets. I say this to differentiate ransomware attacks from brute force attacks (likethose that have affected SQL servers globallythrough...
CVE-2023-38831 refers to ahigh-severity flawin WinRAR that allows attackers to execute arbitrary code upon attempting to view a benign file within a ZIP archive. Findings from Group-IB in August 2023 disclosed that the bug had been weaponized as a zero-day since April 2023 in attacks targeti...
An intrusion through malicious code in the SolarWinds Orion product. This results in the attacker gaining a foothold in the network, which the attacker can use to gain elevated credentials. Microsoft Defender now has detections for these files. Also, seeSolarWinds Security Advisory. ...
The NPM ecosystem does have some mechanisms that help limit the impact of attacks. Once a vulnerability has been identified, NPM places the suspect code in its vulnerability database. Once code has been flagged as insecure, NPM will alert developers who try to install it. NPM will then prompt...
In addition to being able to steal from an infected user, the attackers can also rope the infected machine into a larger network of computers to help carry DDoS attacks and also use the machines as a tool for mining cryptocurrency. The malware is advertised across a range of popular u...