News

Lumma malware, a MaaS platform active since 2022, has stolen data from 1.7M+ devices, targeting cryptos, logins, and ...
AttackIQ has released two new attack graphs that emulate the behaviors exhibited by DragonForce ransomware since its emergence in August 2023. Initially based entirely on the leaked LockBit 3.0 (Black ...
The malware often hides behind fake CAPTCHAs and has been used to commit financial fraud. Microsoft took down 2,300 domains ...
Today's ransomware threat actors demonstrate persistent targeting, deliberate operational impacts, and strategic approaches, ...
Microsoft says its Digital Crimes Unit (DCU) successfully disrupted the server infrastructure behind Lumma Stealer, a malware ...
Lumma Stealer operation hit 400,000 computers worldwide before coordinated takedown shut down Russian cybercrime kingpin.
Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an ...
Ransomware Protection is a useful feature that comes with Windows 11 to help secure users' devices against Ransomware attacks ...
Cyber Threat Intelligence (CTI), brand protection and other cyber risk initiatives shouldn’t only be utilized by security and cyber teams.
Do you install a lot of different apps on your Linux computer? Are you worried that one of these apps might have a virus or malicious code that steals your data? Well, here are five security practices ...
Introduction A well-known organisation called SolarWinds was attacked in September 2019. In this attack, a hacker used a supply chain attack to inject malicious code into the system. More than 18,000 ...
But what happens when disaster strikes — when data itself is at stake? Whether it’s ransomware, hardware failure, or an internal breach, the event could turn into a catastrophe if you are unprepared.