The Sandworm’s Way: Wiper Deployment via Active Directory
In recent years, the world has witnessed a rise in state-sponsored cyberattacks aimed at critical infrastructure, causing widespread disruption and ...
Read moreIn recent years, the world has witnessed a rise in state-sponsored cyberattacks aimed at critical infrastructure, causing widespread disruption and ...
Read moreThe cyber security landscape has been for years dominated by the ransomware phenomenon. But one of the most significant developments ...
Read moreThe Network and Information Security Directive (NIS2) is a new set of cybersecurity regulations adopted by the European Union (EU) ...
Read moreState-organized hacktivism is an increasingly popular form of cyber operation that has been used by governments to achieve political goals. ...
Read moreSecurity researchers of Kaspersky witnessed the suspected North Korean hacker group dubbed "Andariel" using their famous DTrack malware against European ...
Read moreA gang of French-speaking hackers has managed to aggregate a sum of at least $11 million during their numerous years ...
Read moreThe European Union Agency for Cybersecurity (ENISA) published a report revealing that cyberwarfare, hacktivism, and malicious cyberattacks have transformed the ...
Read moreThe Strengthening American Cybersecurity Act (SACA), signed into law in March of 2022, gives federal authorities an unprecedented look at ...
Read moreDuring regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted ...
Read moreAn organization's cybersecurity requires people to collaborate and to understand and respond to legal, economic, political and technological frameworks. There ...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.