"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
The European Union Agency for Cybersecurity (ENISA) published a report revealing that cyberwarfare, hacktivism, and malicious cyberattacks have transformed the...
Read moreThe Dutch police recently recovered 155 decryption keys from victims of the DeadBolt ransomware gang, revealing the hackers' creativity while...
Read moreDuring regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted...
Read moreAPT-36, also known as Transparent Tribe and Mythic Leopard, is a Pakistan-based APT group that targets Indian government employees. Zscaler...
Read moreOn July 13th, 2022, Emotet suddenly stopped spamming in what appears to be a move to protect its victims. It...
Read moreAn investigation has discovered that malicious ads on piracy sites are costing consumers $121 million by tricking people into installing...
Read moreCryptojacking is a form of cybercrime in which cybercriminals exploit any kind of connected devives (computers, smartphones, tablets, IOT or...
Read moreThe person responsible for protecting Uber's data was found guilty of inadequately safeguarding the information, which makes CISOs' personal liability...
Read moreOn several occasions the Russian military has coupled its cyberattacks with conventional weapons aimed at the same targets. 🚩The...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.