Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

Photo: INTERPOL

North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit, Top Aces Inc., Ransomware, Ransomware attack, cyberattack,

Canadian defense contractor Top Aces Inc became the victim of a ransomware attack. LockBit group, an infamous ransomware gang known for its strict principles, already claimed responsibility. They boasted of it by posting the logotype of this company on their Darknet site. More details about the Top Aces company Top Aces Inc is a defense… Continue reading LockBit attacks the Canadian defensive co. Top Aces inc

Famous Spyware Attacks: TOP Spyware Examples

Spyware can definitely be called the most sophisticated malware these days. It never acts openly, using tricky techniques, and appears more and more often together with other viruses. Together with its brother-in-law – stealer malware – spyware helps the cybercriminals to find and exfiltrate the data from attacked corporations. Moreover, ransomware that aims at individuals… Continue reading Famous Spyware Attacks: TOP Spyware Examples

NASA has faced 6000 cyberattacks in the past four years

NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the National Aeronautics and Space Administration. The document states that NASA has institutional systems that are used for the day-to-day work of employees (this includes data centers, web services, computers and networks). NASA also has separate… Continue reading NASA has faced 6000 cyberattacks in the past four years

Microsoft developed a SimuLand lab environment for simulating cyberattacks

Microsoft has developed an open source SimuLand lab environment to help testing and improving Microsoft 365, Defender, Azure, and Azure Sentinel protection against a variety of cyberattack scenarios. SimuLand enables “resources from a variety of data sources, including telemetry from Microsoft 365 Defender security products, Azure Defender, and other integrated sources through Azure Sentinel Data… Continue reading Microsoft developed a SimuLand lab environment for simulating cyberattacks

Who stands behind cyberattacks? Top 5 types of attackers

When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to… Continue reading Who stands behind cyberattacks? Top 5 types of attackers