BumbleBee is a malware loader that specifically targets Windows computers. Initially discovered in March 2022, it has marked over a year of continuous evolution since its emergence. Since its early stages, BumbleBee was under active development. With consistent refinement and the integration of new features, the...
Malicious actors often devise ingenuous ways to infiltrate networks. Michael Sikorski, CTO and vice president of engineering of Unit 42 at Palo Alto Networks, shed light on an unconventional tactic deployed by Russian hackers: the Trojanization of legitimate advertisements.
A likely Russian toolkit dubbed Telekopye by security researchers lets thieves focus on honing their social engineering skills without having to worry about the technical side of online scamming. Users dub victims "Mammoths," leading security firm Eset to christen Telekopye customers "Neanderthals."
Cyberattacks are on the rise, and they're costing businesses billions of dollars each year. But what many businesses don't realize is that the biggest threat to their security is often their own employees.
Download this eBook, we'll explore how user ignorance can lead to cyberattacks, and we'll share real-world...
Government-backed North Korean hackers are posting convincing U.S. military job recruitment documents to lure Korean-speaking victims into downloading malware staged from legitimate but compromised South Korean websites, according to security researchers.
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
But how can you reduce your organization’s attack surface? We looked at 12.5 million users across 35,681 organizations to find out.
In this webinar...
Despite the significant advances technology has made over the past few years, email remains one of the best tools for cybercriminals. Training is just one piece of the puzzle. The best defense against today's cybercrime landscape is a multilayered security strategy.
Spanish law enforcement officers scored several recent wins against cybercriminals this month. Police nabbed a Ukrainian hacker on the run for 10 years, arrested a fraudster known to have run a smishing campaign that amassed 1.2 million euros, and broke up a phishing nexus - all in two weeks.
With the recent global resurgence of Pegasus, come join a discussion about, what we are calling "arguably the most sophisticated mobile spyware we've seen yet". See how Pegasus works, its history, campaigns, and those who enjoy traveling, we will also talk about steps you can take to better protect yourself.
Join...
The Asia Pacific region has experienced a significant surge in online fraud due to the COVID-19 pandemic. Phishing, vishing, and smishing attacks have become rampant, with phishing attempts rising by 75% and vishing attacks increasing by 554%. Notably, bot attacks have risen by 135%. It is crucial for businesses in...
Granting third parties access to sensitive data introduces inherent risks that organizations must address effectively. So how does an organization best manage that third-party risk while balancing an organization's inherent need for usability?.
Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.
Join Roger Grimes, KnowBe4’s...
This Expel Quarterly Threat Report (QTR) delivers intelligence you can put into play today on some of the most active attack vectors our SOC leadership team observed in the first quarter of this year. By sharing how attackers got in, and how we stopped them, we’ll translate the security events we detect into...
Technology and software-as-a-service, or SaaS, companies ship code at scale. Beyond Identity offers ways for them to solve the problems of phishable authentication factors, bring-your-own devices or BYOD, device security posture, zero trust risk policy enforcement, and user identity.
Banks are facing unprecedented challenges in securing their digital ecosystems while maintaining cost efficiency. With cybercriminals increasingly targeting the financial industry, banks face risks to their reputation as trustworthy partners. With data breach costs averaging nearly $6 million per incident, banks...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.