RansomwareAkira ransomware decryption method uses GPUs to brute force keysSource code for the decryption method was published by programmer Yohanes Nugroho.
Vulnerability ManagementApache Tomcat flaw actively exploited; could allow ‘devastating’ RCERemote code execution may be achieved on vulnerable servers with a single PUT API request.
Application securityAndroid spyware ‘KoSpy’ spread by suspected North Korean APTMalicious apps previously in the Google Play Store enabled theft of messages, files and more.
Security OperationsNew research reveals flaws in security team performance metrics IDC's survey of 900 security leaders reveals widespread use of volume-based metrics for team performance. How do we shift from measuring activity to measuring true impact?
Phishing95% of data breaches involve human error, report revealsMeanwhile, employees tend to be overconfident in their ability to detect scams.
Penetration TestingCobalt Strike abuse by cybercriminals slashed 80%Fortra gave an update on two years of efforts to reduce abuse of its redteaming tool.
RansomwareCybercriminals go old school with snail mail ransomware schemeThe FBI is warning of a ransomware operation targeting C-suite executives via the US Postal Service.
Cloud SecurityHow to plan your cloud migration with security in mindTo protect your cloud-based assets, your organization must consider security and compliance when planning your cloud migration journey.
Threat IntelligenceSurvey highlights rise of AI, multichannel, personality identity attacksThe SoSafe Cybercrime Trends 2025 report also covers supply chain risks and cyber resilience inequality.
MalwareEncryptHub malware operations, attack chain exposedThe threat actor has compromised more than 600 organizations to deploy infostealers.
Proactive law enforcement takedowns in 2024 reshaped the cybercrime ecosystemDon Smith December 30, 2024