"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
Log4j is a Java-based logging utility used in numerous applications. It is designed to log information, determine how applications are...
Read moreState-organized hacktivism is an increasingly popular form of cyber operation that has been used by governments to achieve political goals....
Read moreSecurity researchers of Kaspersky witnessed the suspected North Korean hacker group dubbed "Andariel" using their famous DTrack malware against European...
Read moreA ransomware hack has blocked a critical logistics tool for Denmark's largest railway company. DSB is the leading Danish railway...
Read moreSupply chain-attacks pass through the IT systems of the targeted company's service providers, which makes them difficult to detect. These...
Read moreThe Dutch police recently recovered 155 decryption keys from victims of the DeadBolt ransomware gang, revealing the hackers' creativity while...
Read moreOn Monday, November 7 of 2022, Lockbit hackers were supposed to publish "highly sensitive and confidential information" of Thales, a...
Read moreDuring regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted...
Read moreAPT-36, also known as Transparent Tribe and Mythic Leopard, is a Pakistan-based APT group that targets Indian government employees. Zscaler...
Read moreOn July 13th, 2022, Emotet suddenly stopped spamming in what appears to be a move to protect its victims. It...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.