Browsing Category
Cybersecurity
#BHUSA: What has Changed in the Post-Stuxnet Era?
Stuxnet was a watershed moment in the history of cybersecurity and helps to serve as a precedent for attacks that are happening…
US Unmasks Suspected Conti Ransomware Actor
The US government has for the first time revealed the identity of whom it believes to be a key member of one of the most prolific…
Zeppelin Ransomware Victims May Need Multiple Decryption Keys
The US authorities have warned that victims of a ransomware-as-a-service (RaaS) family may require multiple unique decryption keys…
Recovery From NHS Ransomware Attack May Take Another Month
A key NHS IT partner that was hit by a ransomware attack last week has said it could take three to four weeks before all systems…
CISA Unveils Cybersecurity Toolkit to Shield U.S. Elections From Hackers
The US Cybersecurity and Infrastructure Security Agency (CISA) has compiled and released a list of free cybersecurity tools for…
Zimbra RCE Vulnerability Exploited Without Admin Privileges
A remote-code-execution (RCE) vulnerability affecting Zimbra Collaboration Suite (ZCS) email servers was exploited without valid…
Android Banking Trojan SOVA Comes Back With New Features, Including…
The Android banking Trojan SOVA has been spotted in the wild again and appears to have new features.
The news comes from Cleafy’s…
#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
The US Department of Homeland Security (DHS) launched its Cyber Safety Review Board (CSRB) in February 2022, as an effort to help…
NFTS Are Cool but Dangerous
By Guy Rosefelt, CPO, Sangfor Technologies
NFTs have become very popular with collectors and are more ubiquitous every day. …
#BHUSA: Russia’s Wiper Attacks Against Ukraine Detailed
Alongside the physical invasion of the Ukraine, Russia also launched a cybersecurity invasion, with the use of multiple tools,…