ALPHV Brings MGM Resorts to a Halt in Ten Minutes In a recent cyber incident that has shaken the operations of MGM Resorts, the ALPHV/BlackCat ransomware group has emerged as the main culprit. This unanticipated breach originated from an unusual source, LinkedIn,...
Security Spotlight
This Week in Cybersecurity: Sep 04 – Sep 08
Critical Vulnerabilities Discovered in SEL’s Power Management Products In a recent disclosure, Schweitzer Engineering Laboratories (SEL) finds itself in the spotlight, as Nozomi Networks uncovers nine security vulnerabilities within their electric power management...
Unseen Threats: Demystifying Fileless Malware Attacks
In today's digital landscape, cybersecurity is a critical concern for organizations of all sizes. Malicious actors are constantly evolving their tactics to bypass traditional security measures. One such technique that has gained significant traction is deploying...
Behind Data Breach Costs: Evaluating Expenses and Preparedness
Data breaches have become a significant concern for organizations of all sizes and industries. Not only can data breaches result in financial losses, but they also lead to reputational damage and loss of customer trust. Understanding the factors that influence the...
This Week in CyberSecurity: August 14 – August 18
LABRAT Campaign Exploits GitLab Vulnerability for Cryptojacking and Proxyjacking A sophisticated campaign has come to light, showcasing the strategic utilization of a formerly vulnerable flaw within GitLab as a pivotal element in an intricate scheme involving both...
Cyberattack Exposes Data of Students from Colorado’s Public High Schools and Colleges
The Colorado Department of Higher Education has issued an alarming notice on Friday regarding a large-scale cybersecurity breach. This breach, believed to have occurred over a span of more than a decade leading up to 2020, has potentially exposed the personal...
This Week in Cybersecurity: July 31 – Aug 04
AWS SSM Agent Abused as a Remote Access Trojan Cybersecurity experts have recently unearthed a novel post-exploitation method within Amazon Web Services (AWS), highlighting potential risks to Windows and Linux environments. This technique involves the unauthorized use...
The Cyber Sleuth’s Toolkit: Top Tools for Digital Forensics
Whether it’s analyzing disk images, exploring network traffic, or examining mobile devices, digital forensics tools are indispensable for cyber sleuths to crack complex cases and protect digital assets.
In this blog, we will delve into the top tools that form the Cyber Sleuth’s Toolkit for effective digital forensics investigations.
BlackByte and Akira Ransomware Claims Attack on Yamaha
Yamaha Canada Music, a prominent division of the renowned Japanese manufacturing giant Yamaha Corporation, has fallen victim to a recent cyberattack that has sent shockwaves through the industry. The cyber incursion came to light after two separate ransomware gangs...
Lazarus Group Hijacks Microsoft IIS Servers to Distribute Malware
The notorious Lazarus hacking group has been actively targeting Windows Internet Information Service (IIS) web servers to distribute malware. South Korean security analysts at ASEC have been closely monitoring Lazarus' activities, and they've recently uncovered the...
Stay Up to Date With The Latest News & Updates
Join Our Newsletter
Follow Us