Activity dubbed βRaspberry Robinβ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.
By Elizabeth Montalbano β May 26th 2022 at 10:30
Actors claiming to be the defunct ransomware group are targeting one of Akamiβs customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.
By Elizabeth Montalbano β June 1st 2022 at 10:38
Threat actors already are exploiting vulnerability, dubbed βFollinaβ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
By Elizabeth Montalbano β June 1st 2022 at 10:38
Threat actors already are exploiting vulnerability, dubbed βFollinaβ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
By Elizabeth Montalbano β June 3rd 2022 at 12:42
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
By Elizabeth Montalbano β June 3rd 2022 at 12:42
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
As governments crack down on ransomware, cybercriminals may soon shift to business email compromiseβalready the world's most profitable type of scam.
MongoDB claims its new βQueryable Encryptionβ lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.
By Elizabeth Montalbano β June 21st 2022 at 11:20
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization and Microsoft to lift Office365 and Outlook log-in details.
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.
By Elizabeth Montalbano β June 21st 2022 at 11:20
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization and Microsoft to lift Office365 and Outlook log-in details.
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.