NetWalker Ransomware Gang Hunts for Top-Notch Affiliates
The operators behind the Toll Group attack are taking applications for technically advanced partners.
The operators behind the Toll Group attack are taking applications for technically advanced partners.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Throughout my time at G2, traffic patterns on G2.com category pages have been one of the most significant data points to monitor. Time and again, the changes in those patterns have proven a good indicator of emerging trends and a strong reflection of change in software markets. The current global crisis caused by COVID-19 is, unsurprisingly, creating a large shift to tools that support remote work.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
It’s happened. Dedicated DC film fans have finally seen their patience rewarded as Warner will #ReleasetheSnyderCut on its nascent HBO Max streaming service next year. This is real. #releasethesnydercut@HBOMax pic.twitter.com/Cnvupwg48W — Zack Snyder (@ZackSnyder) May 20, 2020 Director Zach Snyder announced the release during an online watch party (a common social activity people have partaken…
The Ukrainian police have arrested a hacker who made headlines in January last year by posting a massive database containing some 773 million stolen email addresses and 21 million unique plaintext passwords for sale on various underground hacking forums. In an official statement released on Tuesday, the Security Service of Ukraine (SBU) said it identified…
At the end of March, we examined the impact of the coronavirus pandemic on the events industry. As businesses continue to cancel and postpone their in-person events, event software vendors have been scrambling to accelerate their product roadmaps and release new offerings to help their customers pivot to virtual events.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A chunk of Bitcoin BTC has just moved for the first time since it was mined way back in 2009, causing some to speculate that Satoshi Nakamoto has returned. The shift was detected by Twitter-based blockchain monitor @whale_alert, which confirmed that the 40 BTC featured in the transaction were mined in the first month of…
As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form. Today, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on…
Late last year, I laid out the top seven fintech trends for 2020. Typically, trends reveal themselves over longer stretches of time, but the rapid spread of COVID-19 and the subsequent shift to a remote world has prompted an acceleration for some.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Microsoft hosted its first virtual Build conference for developers last night. The company announced a bunch of new stuff including a quantum computer built with OpenAI, new building blocks for live collaboration in Office, and Lists — a collaborative app for teams. Along with all this, the tech giant is also bringing some key changes…
Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker’s choice, potentially…