Tuesday, May 18, 2021

Analytics

Apple was silent about jailbreaking 128 million iPhones in 2015

Apple was silent about jailbreaking 128 million iPhones in 2015 In September 2015, information security specialists identified about 4 thousand applications in the App Store that were...

Overview of security incidents for the period 1-7 May 2021

Overview of security incidents for the period 1-7 May 2021 Fraudsters copied the voices of the heads of companies in which their victims work. An...

In 2020, ransomware demanded an average of $ 4.6 million from medical companies

In their annual Data Security Incident Response Report, experts from the American law firm BakerHostetler talked about the ransomware incidents last year. The healthcare industry...

Experts

Cyber Threat Intelligence Home Page

Security researchers talk about DarkSide ransomware

0
Last week, ransomware operators DarkSide launched a cyberattack on Colonial Pipeline, the largest oil pipeline operator in the United States. Information security firms and cybersecurity researchers have shared information about...

News

Events

Darkside 2.0 – Who are they?

Darkside 2.0 are a ransomware network from the Russian-speaking Dark Web with a global network of affiliates targeting major corporations.  The intelligence and global cybersecurity community continue to track the situation regarding the Colonial Pipeline, one of the U.S. major oil pipelines affected by a cyberattack. While the press is speculating about the responsibility for the attack, the FBI and cybersecurity professionals are working on incident containment as it has already started to affect the domestic...

Technologies

Cyber Threat Intelligence Home Page

How Blockchain Is Changing the Cybersecurity Narrative Today

0
Blockchain, to most people, is simply a decentralized ledger system for recording cryptocurrency transactions. But there is more to it as it is proving...
Cyber Threat Intelligence Home Page

Malicious DNS attributes of 70% of Phishing and Crypto mining according to Cisco

0
A recent report from Cisco indicates that phishing and crypto mining accounts for more than 70% of DNS traffic. Furthermore, there is an alarming...
Cyber Threat Intelligence Home Page

Clubhouse Involved in a Data Breach Scandal

0
Current reports assert that Clubhouse, an audio-based iPhone social app launched in April 2020 by Rohan Seth and Paul Davison, has suffered a recent...
Cyber Threat Intelligence Home Page

Malicious Actors are Increasingly Using Automated Tools to Launch Attacks

0
Malicious Actors are Increasingly Using Automated Tools to Launch Attacks A recent assessment by cybersecurity firm Barracuda Networks has revealed that cybercriminals are increasingly using...
Cyber Threat Intelligence Home Page

Evolvement of Cloud Security Threats into Identities and Elements

0
According to recent identified cyber-attacks, cloud infrastructure is the latest vector for threats and vulnerabilities. Today's cloud security threats include identity theft, which has...
Cyber Threat Intelligence Home Page

How AI is playing a key role in curbing cyber threats

0
How AI is playing a key role in curbing cyber threats Technology is advancing and criminals continue to use cyberspace to commit a crime. Due...