Zephyrnet Logo

Tag: threat actors

Defending Our Schools: The State of Cybersecurity in K-12 – EdSurge News

K-12 leaders tasked with preparing students for the future workforce are doing so amid ever-increasing cyber threats. The dynamic landscape of in-person, virtual and...

Patch Now: Critical Fortinet RCE Bug Under Active Attack

As expected, cyberattackers have pounced on a critical remote code execution (RCE) vulnerability in the Fortinet Enterprise Management Server (EMS) that was patched last...

How New-Age Hackers Are Ditching Old Ethics

COMMENTARYHacking is a phenomenon that has been around since at least the 1960s, initially as an exploration into computing more broadly, fueled by the...

GitHub Developers Hit in Complex Supply Chain Cyberattack

An unidentified group of threat actors orchestrated a sophisticated supply chain cyberattack on members of the Top.gg GitHub organization as well as individual developers...

North Korea Cyberattacks Account for 50% Foreign Currency Earnings, $3B Stolen in Crypto

The United Nations (UN) Security Council has released a report showing North Korea earns 50% of its foreign exchange earnings from cyberattacks. The council is...

Russian APT Releases More Deadly Variant of AcidRain Wiper Malware

Researchers have uncovered a more dangerous and prolific version of the wiper malware used by Russian military intelligence to disrupt satellite broadband service in...

United Arab Emirates Faces Intensified Cyber-Risk

The United Arab Emirates' focus on becoming a global hub for business and innovation is driving digital transformation in the Middle East, with the...

Airbus Calls Off Planned Acquisition of Atos Cybersecurity Group

European aerospace conglomerate Airbus has cancelled plans to acquire French IT services company Atos' Big Data and Security (BDS) business just weeks after opening...

Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes

A security bug in the widely used Kubernetes container-management system allows attackers to remotely execute code with System privileges on Windows endpoints, potentially leading...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

Sophisticated Vishing Campaigns Take World by Storm

Voice phishing, or vishing, is having a moment right now, with numerous active campaigns across the world that are ensnaring even savvy victims who...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?