Plato Data Intelligence.
Vertical Search & Ai.

Tag: threat actors

Contrast Security Advances DevSecOps

Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning process.Surag Patel,...

How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats

The Coronavirus is hitting hard on the world's economy, creating a high volume of uncertainty within organizations.Cybersecurity firm Cynet today revealed new data,...

NutriBullet becomes a victim of Magecart Cyber Attack

MageCart Group which is a syndicate of malicious actors is reported to have launched a cyberattack on the website of the...

Malware spotlight: Ekans

IntroductionIndustrial Control Systems, or ICS, have been the target of malware for some time now. Most of these threats target Windows systems...

Trend Micro addresses two issues exploited by hackers in the wild

Trend Micro has addressed several serious vulnerabilities in its products, including two flaws that have been exploited in the wild. Trend Micro has...

Beware of Android Coronavirus Tracker app that Lock’s Your Device & Asks Ransom Payment

Cybercriminals using the Coronavirus outbreak to trick users into installing malicious corona virus-related apps. In the current panic, situation users are most vulnerable...

Threat actors play on people’s desire to help cure Coronavirus

Much like the new cases of COVID-19 that occur daily, cybercriminals are constantly rolling out new tactics, techniques and procedures based on the pandemic....

Coronavirus Widens the Money Mule Pool

With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more...

Immediate Free Website Protection Against Third-Party Risks During the Covid-19 Crisis 

Supply-chain attacks, website third-party risks, client-side threats, Magecart attacks, foam-jacking…, It’s all there, threatening your most valuable asset. Well, don’t let it bother...

Most ransomware attacks take place outside the working hours

Most of the ransomware attacks targeting the enterprises occur outside working hours, during the nighttime or during the weekend. Security experts from FireEye...

Ursnif campaign targets Italy with a new infection Chain

Malware researchers from Cybaze-Yoroi ZLab have uncovered a new Ursnif campaign that is targeting Italy with a new infection chain. Introduction Ursnif is...

Many Ransomware Attacks Can be Stopped Before They Begin

The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.Many threat actors tend to...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?