Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…
Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…
Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…
Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…
Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…
Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…
Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…
Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…
Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware's demand for access to…
Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.