21% of all HTML attachments scanned over past month found malicious: Report

The malicious HTML attachments include a link to a phishing site, which, when opened, gets redirected to a third-party machine that requests the users to enter their credentials to access information or download a file that may contain malware.

'Alarm sounded' on Russian threat to Ireland

Professor Edward Burke made the comment following the report of High Court judge Charles Meenan, who supervises the interception of phone calls and post, and access to traffic data on private communications.

Google: Half of 2022's Zero-Days Are Variants of Previous Vulnerabilities

Google Project Zero has observed a total of 18 exploited zero-day vulnerabilities in the first half of 2022, at least half of which exist because previous bugs were not properly addressed.

Ukraine Targeted by Almost 800 Cyberattacks Since the War Started

According to Ukraine's State Service of Special Communications and Information Protection (SSSCIP), the country's networks have been under a constant barrage of hacking attempts since the war started.

De-anonymizing ransomware domains on the dark web

Cisco Talos researchers developed three techniques to identify ransomware operators' dark websites hosted on public IPs, allowing them to uncover previously unknown infrastructure for the DarkAngels, Snatch, Quantum, and Nokoyawa ransomware groups.

Destructive firmware attacks pose a significant threat to businesses

The threat of firmware attacks is a growing concern for IT leaders now that hybrid workers are connecting from home networks more frequently, according to HP Wolf Security.

Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter

Researchers with the security firm WatchGuard report that unique ransomware detections in the first three months of the year were triple the volume of the same time period in 2021.

List of Top 25 Most Dangerous Software Weaknesses for 2022 Published

CISA encourages users and administrators to review the 2022 CWE Top 25 Most Dangerous Software Weaknesses and evaluate recommended mitigations to determine those most suitable to adopt.

Hacking gets dangerously real: 8 cybersecurity predictions to watch out for

The list comes from tech analyst Gartner, which said business leaders should build these strategic planning assumptions into their security strategies for the next two years.

Malware Loaders Opt for API Hammering to Evade Detection

Malware Loaders Opt for API Hammering to Evade Detection - Cybersecurity news - Trends, Reports, Analysis
According to researchers, the tactic is more effective than the ‘Ping Sleep’ technique where the malware constantly sends ICMP network packets to an IP address in a loop.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags