Software Cracks and Installers Used to Bring Malware to Your Device

Threat actors often leverage reputable file hosting services like Mediafire and Mega.nz to conceal the origin of their malware and make detection and removal more difficult.

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

Crims Backdoored Their Backdoors. Then the Domains Lapsed

Thousands of vulnerable backdoors exist on expired domains and abandoned infrastructure, exposing government and academic hosts to potential hijacking by malicious actors.

Report: Only 26% of Europe’s Top Companies Earn a High Rating for Cybersecurity

With the EU’s Digital Operational Resilience Act (DORA) deadline approaching on 17th January, 2025, Europe’s top 100 companies face an urgent cybersecurity challenge, according to SecurityScorecard.

Vulnerability Overload: 40,000+ CVEs in 2024

Security researcher Jerry Gamblin has released his annual CVE data review. 2024 saw an unprecedented surge in published Common Vulnerabilities and Exposures (CVEs), reaching a record high of 40,009.

Report: Phishing Click Rates Tripled in 2024

The rate at which enterprise users clicked on phishing lures nearly trebled in 2024, according to new research by Netskope. More than eight out of every 1000 users clicked on a phishing link each month in 2024, up by 190% compared to 2023.

Report: Scammers Drain $500M From Crypto Wallets in a Year

Victims lost close to $500 million from wallet drainer attacks in 2024, a 67% annual increase, according to new data from Scam Sniffers. The firm's Crypto Phishing Report 2024 is based on analysis of Ethereum Virtual Machine (EVM)-compatible chains.

Project Quarantine: PyPI’s New Line of Defense Against Malware

Project Quarantine is designed to bridge the gap between security and user accessibility. It enables administrators to place suspicious projects in a quarantined state, making them invisible in the PyPI Simple Index and preventing their installation.

When Risky Cybersecurity Behavior Becomes a Habit Among Employees

While the majority of employees avoid risky behaviors, a small subset makes them a habit, posing a significant cybersecurity challenge, according to a report by Mimecast.

Majority of UK SMEs Lack Cybersecurity Policy

More than two-thirds (69%) of UK small and medium enterprises (SMEs) lack a cybersecurity policy, according to Markel Direct. The research identified a significant lack of basic cybersecurity measures and hygiene in place across these companies.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags