Zephyrnet Logo

Tag: exfiltration

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

The Olympic Games, the FIFA World Cup, and the Super Bowl are just a few examples of iconic sporting events that showcase the global...

Top News

Hubris May Have Contributed to Downfall of Ransomware Kingpin LockBit

For all its vaunted success, the LockBit ransomware operation appears to have already been beset by problems when an international law enforcement effort led...

How DSPM Fits into Your Cloud Security Stack – DATAVERSITY

DSPM solutions provide unique security capabilities and are specifically tailored to addressing sensitive data in the cloud, but also to supporting a holistic cloud...

Meta Disrupts 8 Spyware Firms, 3 Fake News Networks

Meta has identified and interrupted six spyware networks linked to eight companies in Italy, Spain, and the United Arab Emirates, as well as three...

Russian APT Turla Wields Novel Backdoor Malware Against Polish NGOs

Russia-sponsored advanced persistent threat group (APT) Turla is now targeting Polish NGOs in a cyberespionage campaign that uses a freshly developed backdoor with modular...

Cybersecurity’s Transformative Shift

COMMENTARYCybersecurity, once a fortress built on rigid protocols and reactive measures, is undergoing a transformative shift. As digital landscapes become more intricate and data-driven,...

How Raspberry Robin Exploits 1-Day Bugs to Infiltrate Windows Networks

Title: Raspberry Robin: Exploiting 1-Day Bugs to Infiltrate Windows Networks Introduction: In the world of cybersecurity, hackers are constantly finding new ways to exploit vulnerabilities in...

Top trends in Cybersecurity, Ransomware and AI in 2024

According to research from VMware Carbon Black, ransomware attacks surged by 148% during the onset of the COVID-19 pandemic, largely due to the rise in...

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET has collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing...

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs | Amazon Web Services

Generative artificial intelligence (AI) applications built around large language models (LLMs) have demonstrated the potential to create and accelerate economic value for businesses. Examples...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?