An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a study revealed .The entity attacking Tor users is…
ProxyLogon exploit, impact on-prem Microsoft Exchange Server 2013, 2016, and 2010. Patches, vulnerability detection tools, and mitigation instructions were made available in March, but it is still estimated that up…
REvil (aka Sodinokibi) is a ransomware family that has been targeting numerous organizations and wreaking havoc. It was first identified in early-2019 and used by the GOLD SOUTHFIELD threat group.…
Remote browser isolation is a technology also referred to as web isolation or simply browser isolation. Remote browser isolation is an advanced cybersecurity technique that provides an additional layer of…
A new information stealer has been discovered that is being delivered via spam emails and targets cryptocurrency wallets. This threat is named Panda Stealer and was observed mostly targeting users…
A cyber-attack has never taken down a U.S. fuel pipeline quite as big as the Colonial Pipeline. It’s the nation’s largest gasoline, diesel and jet fuel system and a critical source…
Recently Google implemented new security features to Gmail to address phishing threats, and now Microsoft is following suit with a planned update to Exchange. Via Microsoft's 365 Roadmap, the company…
Microsoft is warning of a large-scale BEC campaign that targeted more than 120 organizations with gift card scam. The attackers targeted organizations in multiple industries, including the consumer goods, process…