CISOMAG
Saint Bot – A New Malware Downloader Spotted
Security experts from Malwarebytes discovered a new malware strain used in phishing attacks to install credential stealers and additional malware payloads. Tracked as Saint...
Malvertising Mayhem: Here’s Everything You Need to Know
Cybercriminals often create innovative malware variants and malicious campaigns to steal users’ identities or private information. In most malware-related attacks, threat actors deploy malware...
What is DDoS and How Can I Better Defend My Business...
DDoS attacks are attempts to flood your network resources and disrupt the normal flow of traffic. Think of it as a sudden traffic jam...
API Risks: What Are They and How to Manage Them
Risk management is essential to every business. You can’t eliminate risk, but mitigation strategies will help lower the impact and likelihood of catastrophic events...
Has Babuk Ransomware Gang Attempted a Slam Dunk on Houston Rockets?
It is the Rockets vs the Babuk ransomware gang, and it seems like Babuk has drawn first blood with a slam dunk. No, we...
FBI Removes Malicious Web Shells from Microsoft Exchange Servers
The FBI executed a court-authorized operation to copy and delete malicious web shells from hundreds of vulnerable systems in the U.S. that were running...
97% of Organizations Suffered a Mobile Malware Attack in 2020
The number of threats that our mobile devices encounter increases every year and the risks from mobile malware has a large share in it....
Episode #10: The Case for Virtual Cybersecurity
With the rapid pace of digitalization, businesses are increasingly exposed with more attack surface for cyber criminals to compromise their private data and networks.
SPONSORED...
COVID-19 and the Current Cyberthreat Landscape in India
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of...
NSA Alerts About Four Critical Vulnerabilities in Microsoft Exchange Servers
The National Security Agency (NSA) informed Microsoft about four critical vulnerabilities that could be exploited by attackers to compromise Microsoft Exchange Servers remotely. The...