
Group policies enable ransomware spread
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
489 articles
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
At the 2021 RSA Conference, a panel of experts discusses the need for better collaboration in thwarting cybercrime.
A ransomware attack forced Ireland’s healthcare service to shut down its servers. Here’s what we know so far.
Should you contact authorities about ransomware?
The Galactic Empire’s heirs analyzed for cybersecurity.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
The most active groups targeting companies, encrypting data, and demanding ransom.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.