Recently it has been observed that Morphisec Labs has witnessed a new wave of JSSLoader infections this year.
Read MoreSince 2020, supply chain attacks have grown exponentially, and innovative mitigation solutions are urgently required.
Read MoreWith examples changing hands for up to $69 million, hosting digital content on blockchain and selling it to investors has become one of the most lucrative things creators can do. And as rock stars, international artists, and even politicians keep “minting” non-fungible tokens (NFTs) and investors keep rushing in to buy them, the NFT space has undergone exponential growth.
Read MoreSince 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense.
Read MoreResearchers have identified an advanced persistent threat (APT) group responsible for a series of cyberespionage and spyware attacks against the aviation, aerospace, transportation and defense industries since at least 2017 that feature high-volume email campaigns using industry-specific lures.
Read MoreFor years, a low-skilled attacker has been using off-the-shelf malware in malicious campaigns aimed at companies in the aviation sector as well as in other sensitive industries. The threat actor has been active since at least 2017, targeting entities in the aviation, aerospace, transportation, manufacturing, and defense industries.
Read MoreTracked using the codename of TA2541, the group has been one of the most persistent threats in recent years, even if their attacks have been largely unsophisticated and have relied on infecting and deploying commodity malware on targets’ networks.
Read MoreEndpoint protection or endpoint detection and response (EDR) security solutions collect and analyze threat data from endpoints connected to a network to facilitate real-time identification of malicious events like breaches and attacks. Also, EDR helps companies continuously monitor endpoint devices and respond to detected cyber threats as they occur. Typically, an EDR solution has four primary functions—monitor endpoints, collect threat data, apply data analytics to see threat patterns, deploy automatic responses to mitigate identified threats, and forensics analysis to investigate incidents further.
Read MoreIdentity Detection and Response (IDR) is a new enterprise cybersecurity method
Read MoreAttackers made more than 30,000 attempts to scan and leverage exploits found in the critical Log4Shell vulnerability in January, according to security firm Kaspersky. Log4Shell, a flaw found in the Apache Software Foundation Log4j library logging tool, was first disclosed to the public in December and continues to be a challenge.
Read More