Enhancing cyber security in financial services: Simulated cyber attacks
Financial institutions are prime targets for malicious actors seeking to exploit vulnerabilities for financial gain or disruption. With the stakes...
Financial institutions are prime targets for malicious actors seeking to exploit vulnerabilities for financial gain or disruption. With the stakes...
Those behind the Black Basta ransomware have been seen modifying their strategies, spreading various types of malicious software like Zbot...
The malicious individuals associated with the More_eggs malware have been connected to two additional malware lineages, showcasing a broadening of...
In recent times, T-Mobile, a major telecommunications provider in the United States, has identified efforts made by malicious individuals to...
Individuals involved with Russia are connected to a cyber surveillance operation targeting companies in Central Asia, East Asia, and Europe....
Hackers affiliated with the Democratic People's Republic of Korea (DPRK) are pretending to be American software and tech advisory companies...
Malicious entities are progressively relying on an innovative method that utilizes near-field communication (NFC) to illicitly withdraw victims' funds on...
Theatergoers are misusing improperly set up JupyterLab and Jupyter Scribblers to carry out live stream theft and facilitate sports copyright...
Several malicious entities have been discovered exploiting a tactic known as Sitting Ducks to seize control of authentic domains to...
According to Google, unethical individuals are resorting to methods such as landing page concealing to carry out scams by pretending...
A group of cybercriminals has been detected using a fresh method to exploit extended attributes in macOS files in order...
Malicious individuals connected to the Democratic People's Republic of Korea (DPRK also known as North Korea) have been discovered integrating...
Recent reports from Sophos X-Ops highlighted multiple MDR incidents involving the exploitation of a vulnerability found in Veeam backup servers....
As delineated in our overview article, Sophos has been actively countering various threat groups originating from China targeting perimeter devices...
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence A recent incident involving threat actors in North Korea showcased their financial interests...