ransomware

Cybersecurity Threat Advisory: Play Ransomware expands

A new Linux variant of the infamous Play Ransomware, also known as Balloonfly and PlayCrypt, was recently discovered. This variant

Cybersecurity Threat Advisory, Featured, Linux, Play ransomware, Prolific Puma, ransomware, Security, Syndicated

Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

The Veeam Backup & Replication vulnerability, CVE-2023-27532, which was patched in March 2023 is still being exploited. Attackers have managed

critical vulnerability, Cybersecurity Threat Advisory, exploit, Featured, ransomware, Security, Syndicated, Veeam Backup

Cybersecurity Threat Advisory: New ShrinkLocker ransomware strains

ShrinkLocker is a recent ransomware strain that leverages a legitimate Windows encryption feature, BitLocker, to lock victims out of their

BitLocker, Cybersecurity Threat Advisory, EDR, Featured, ransomware, Security, ShrinkLocker, Syndicated, Windows

Cybersecurity Threat Advisory: Black Basta ransomware surge

The Cybersecurity and Infrastructure Security Agency (CISA) has issued advisories in response to the widespread of Black Basta ransomware attacks.

Black Basta, Cybersecurity Threat Advisory, Featured, malicious software, ransomware, Security, Syndicated

Threat Spotlight: The remote desktop tools most targeted by attackers in the last year

Remote desktop software allows employees to connect into their computer network without being physically linked to the host device or

cyberattacks, Featured, ransomware, remote desktop, Remote Desktop Protocol, Security, Syndicated, Threat Spotlight

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server.

Atlassian Confluence, Cerber Ransomware, critical vulnerability, Cybersecurity Threat Advisory, Featured, ransomware, Security, Syndicated

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language

cybersecurity, data poisoning, Featured, generative AI, malware, phishing, ransomware, Security, Syndicated

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and

cybersecurity, Featured, MSPs, ransomware, ransomware attacks, Security, Syndicated