It’s not lack of data that’s the problem, but the inability to piece it together to truly understand and reduce risk. Read More
Related Posts
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
[[{“value”:”Between crossovers – Do threat actors play dirty or desperate?
In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to”}]] Read More
The Hacker News | #1 Trusted Cybersecurity News Site
New Voldemort malware abuses Google Sheets to store stolen data
New Voldemort malware abuses Google Sheets to store stolen data
A campaign that started on August 5, 2024, is spreading a previously undocumented malware named “Voldemort” to organizations worldwide, impersonating tax agencies from the U.S., Europe, and Asia. […] Read More
New Mad Liberator gang uses fake Windows update screen to hide data theft
New Mad Liberator gang uses fake Windows update screen to hide data theft
A new data extortion group tracked as Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to distract while exfiltrating data from the target device. […] Read More