Mysterious Global Phishing Campaign Uncovered

A mysterious phishing campaign was spotted by threat researchers from Anomali. The global credential gathering phishing campaign was directed primarily at government procurement departments; however, other sectors' including email and...

Hackers Drop Masad Stealer and Steal The Sensitive Data via Telegram

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data via Telegram. Masad Stealer using Telegram as a command...

How your Company Can Get Started With Cybersecurity

Based on conversations I’ve had with executives at conferences, emails, YouTube comments, phone calls and meetings, I believe that just getting your company started with a Cybersecurity program is complex...

Mysterious Global Phishing Campaign Uncovered

A mysterious phishing campaign was spotted by threat researchers from Anomali. The global credential gathering phishing campaign was directed primarily at government procurement departments; however, other sectors' including email and...

Hackers Drop Masad Stealer and Steal The Sensitive Data via Telegram

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data via Telegram. Masad Stealer using Telegram as a command...

How your Company Can Get Started With Cybersecurity

Based on conversations I’ve had with executives at conferences, emails, YouTube comments, phone calls and meetings, I believe that just getting your company started with a Cybersecurity program is complex...

Mysterious Global Phishing Campaign Uncovered

A mysterious phishing campaign was spotted by threat researchers from Anomali. The global credential gathering phishing campaign was directed primarily at government procurement departments; however, other sectors' including email and...

Hackers Drop Masad Stealer and Steal The Sensitive Data via Telegram

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data via Telegram. Masad Stealer using Telegram as a command...

How your Company Can Get Started With Cybersecurity

Based on conversations I’ve had with executives at conferences, emails, YouTube comments, phone calls and meetings, I believe that just getting your company started with a Cybersecurity program is complex...

Insurance Company On The Hook for 1.7 Million Dollars After Denying BEC Scam Claim

An article in the insurance Journal reports that the 11th Circuit Court in Atlanta agreed with a district court ruling that insurance company "Ironshore" is still on the hook for...

LATEST NEWS

MUST READ