data exfiltration
CERT-UA Reports SickSync Campaign: Data Theft Crucial Alert
Recently, the Computer Emergency Response Team of Ukraine cybersecurity (CERT-UA) issued a warning regarding a targeted cyber espionage campaign named SickSync, orchestrated by a group identified as UAC-0020 or Vermin. The CERT-UA ...
Knight Ransomware Attack: Businesses and Healthcare Targeted
A recent emergence in the cybercrime landscape involves a ransomware strain known as RansomHub, which has surfaced as a successor to the notorious Knight ransomware attack. Initially identified as Cyclops 2.0, Knight ...
A Deep Dive Into the Economics and Tactics of Modern Ransomware Threat Actors
The MGM Resorts breach is just one example demonstrating the crippling financial, legal and operational consequences of ransomware incidents ...
OfflRouter Malware Ukraine: Govt Network Breach Since 2015
As per recent media reports, certain government networks in Ukraine have been infected with the Offlrouter malware since 2015. The Offlrouter malware Ukraine has managed to escape detection for nearly a decade ...
EU Whistleblower Act: Organizations Must Protect Whistleblowers
With the new EU whistleblower act, organizations that fail to protect whistleblowers may face fines and suffer data leaks ...
FBI Alert: Dual Ransomware Attack Surge
In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...
How Machine Learning is Vital in Successful Data Exfiltration Detection
Why should a data exfiltration detection solution play a key role in your firm's cybersecurity strategy? ...
The Data Exfiltration Techniques You Need to be Aware of
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023? ...
Why do Businesses Need Advanced Enterprise DLP Solutions?
What protections do enterprise DLP tools provide and why should firms be looking beyond legacy solutions to defend against data loss? ...
What You Need to Know About Zero Trust Identity and Access Management
Why should firms be implementing a zero trust identity and access management policy to improve their data security? ...