"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
State-organized hacktivism is an increasingly popular form of cyber operation that has been used by governments to achieve political goals....
Read moreSecurity researchers of Kaspersky witnessed the suspected North Korean hacker group dubbed "Andariel" using their famous DTrack malware against European...
Read moreA ransomware hack has blocked a critical logistics tool for Denmark's largest railway company. DSB is the leading Danish railway...
Read moreSupply chain-attacks pass through the IT systems of the targeted company's service providers, which makes them difficult to detect. These...
Read moreThe Dutch police recently recovered 155 decryption keys from victims of the DeadBolt ransomware gang, revealing the hackers' creativity while...
Read moreOn Monday, November 7 of 2022, Lockbit hackers were supposed to publish "highly sensitive and confidential information" of Thales, a...
Read moreDuring regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted...
Read moreAPT-36, also known as Transparent Tribe and Mythic Leopard, is a Pakistan-based APT group that targets Indian government employees. Zscaler...
Read moreOn July 13th, 2022, Emotet suddenly stopped spamming in what appears to be a move to protect its victims. It...
Read moreRunning a suspicious document or opening a file whose source you don't know is always risky. However, there is a...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.