Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks
A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing list of stealer families focused on...
Protecting Your Microsoft IIS Servers Against Malware Attacks
Microsoft Internet Information Services (IIS) is a web server software package designed for Windows Server. Organizations commonly use Microsoft IIS servers to host websites,...
Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining Attacks
A legitimate Windows tool used for creating software packages called Advanced Installer is being abused by threat actors to drop cryptocurrency-mining malware on infected machines since...
Cyber crooks target Airbnb for fraudulent activities
With millions of listings in 100,000 cities, Airbnb has become a favorite target for cybercriminals looking to exploit popular online platforms for malicious purposes.
New...
Cyberattack blinded two of the most advanced telescopes in the world
Two of the world's most advanced astronomy observatories, the Gemini North Telescope in Hawaii and the Gemini South Telescope in Chile, were forced to...
Cybersecurity Companies Report Surge in Ransomware Attacks
Cybersecurity companies have released a dozen ransomware reports in recent weeks and most of them show a significant increase in attacks.
Ransomware attacks continue to...
10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance
More-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more...
Cequence Security flourishes in the second half of FY23
Cequence Security, Unified API Protection (UAP) provider, revealed a 555% growth in customer expansion during the second half of FY23.
Cequence's approach to uncovering and...
Fastly shares threat intelligence report based on NLX
Fastly has announced the publication of its first threat intelligence report, the "Network Effect Threat Report". Featuring data and insights gathered from the company's proprietary...
Cybersecurity must evolve to tackle rising phishing trends
As the volume of security breaches continue to rise, now is the time to move from legacy multi-factor authentication (MFA) to modern, phishing-resistant MFA,...