News

Image courtesy by QUE.com As digital transformation drives growth and efficiency in the industrial sector, it simultaneously ...
Extortion attempts leap by 46% over a recent six-month period, with manufacturing and construction sectors bearing the brunt.
With over 2,400 ransomware victims in Q1, the platform accelerates access to trusted cybersecurity firms, helping companies protec ...
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate ...
Once inside, adversaries often deploy living-off-the-land techniques (moving laterally within OS systems seemingly ...
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that allows unauthorized access to resources on the SSL VPN feature ...
Not everyone got the memo Ransomware criminals infected a utility billing software providers' customers, and in some cases disrupted services, after exploiting unpatched versions of SimpleHelp’s ...