PRESS RELEASEORANGE COUNTY, Calif. and RICHMOND, Va., Feb. 28, 2024 /PRNewswire/ — Troutman Pepper has formalized an Incidents + Investigations Team that caters to a growing need for comprehensive legal services around data breaches and cybersecurity incident…
Tag: COMPLIANCE
Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data. https://www.proofpoint.com/us/thre…
HR-themed spam campaigns are on the rise, exploiting the Great Resignation and holiday period to lure employees with targeted social engineering. Fraudsters impersonate HR reps to push links to phishing sites or attachments that download malware, aiming to har…
In a new report, Recorded Future’s Insikt Group examines North Korea’s success in its cybercriminal operations targeting the cryptocurrency industry.
This monthly GTSC security overview highlights Chimera Group’s multi-target intrusions using compromised credentials, cloud services, and Cobalt Strike beacons, and covers a separate JsOutProx JavaScript RAT campaign targeting Asian government entities, plus a…
Akira’s Linux ransomware variant is a 64-bit build that supports configurable command-line options, forks processes, encrypts roughly 190 file extensions (appending .akira), and implements multiple symmetric ciphers (AES, Camellia, IDEA, DES, ChaCha20) along w…
Doctor Web uncovered Linux.BackDoor.WordPressExploit.1, a Linux backdoor that hacks WordPress sites by exploiting outdated plugins and themes to inject malicious JavaScript that redirects visitors. A second variant, Linux.BackDoor.WordPressExploit.2, expands t…