LastPass Breach Investigation Goes On, Things are Even Worse

LastPass released an extended note regarding their 2022 cybersecurity incident

LastPass, owned by GoTo (formerly LogMeIn) and with over 30 million users, revealed new details about the cyber incidents that have shaken the company since August 2022, when fragments of source code were reported stolen. In January 2023, the company admitted that the breach was more extensive, involving leaks of accounts, passwords, MFA settings, and… Continue reading LastPass Breach Investigation Goes On, Things are Even Worse

Qakbot Malware Applies New Distribution Methods

Qakbot malware exploits new spreading ways following recent changes in macros execution policies

Today there is an arms race between cybercriminals and antimalware manufacturers. While some release a fix for an existing threat, others must develop new loopholes. Recently, cybersecurity experts noticed that many malware families were using OneNote attachments to infect their victims. Since OneNote is considered a robust application that Microsoft has developed for easy note-taking,… Continue reading Qakbot Malware Applies New Distribution Methods

One Year of Russian-Ukrainian War in Cybersecurity

Ukraine has faced more cyber attacks in a year of war with Russia than ever before.

February 24, 2022, will be a turning point in history. It was the day of the full-scale Russian invasion of Ukraine and the most significant geopolitical event of the past year. This war was, without exaggeration, the bloodiest military conflict in Europe in decades. However, it is the first major hybrid war that uses cyberspace… Continue reading One Year of Russian-Ukrainian War in Cybersecurity

Five Easy Smartphone Security Tips to Keep It Safe From Hackers

These tips will help protect your mobile devices and their information.

These days, the smartphone is more than just a means of communication. Every day we use it to communicate with friends and family, message social networks, browse the web. There are also more specific tasks – accessing our bank account, online shopping, taking photos and videos, streaming, and much more. Your smartphone is the key… Continue reading Five Easy Smartphone Security Tips to Keep It Safe From Hackers

How DDoS Can Badly Hurt Your Business

Inaccessible website or glitching servers is a typical outcome of a DDoS attack

Everyone at least once faced the fact that they cannot go to the desired site or use some service. This is often because companies’ websites have become victims of DDoS attacks. It is even worse when you own a business, and your customers cannot reach you because of the attack. But first, let’s understand what… Continue reading How DDoS Can Badly Hurt Your Business

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

New malware sample brought a new spreading way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming companies using a yet unknown backdoor, named IceBreaker by researchers. IceBreaker Backdoor exploits new phishing way The method of compromising is based on the fact that tech support workers are tricked into opening malicious screenshots… Continue reading IceBreaker Backdoor Emerged, Exploiting New Phishing Way

Web Application Firewall: Difference Blocklist and Allowlist WAFs

A web application firewall protects web apps and APIs by filtering, monitoring, and blocking malicious web traffic.

You may have come across a Web Application Firewall (WAF) concept but have yet to give it much thought. However, it is essential to understand what a WAF is to decide if it is right for you. Now we will take a closer look at web application firewalls and give you a definition, explain their… Continue reading Web Application Firewall: Difference Blocklist and Allowlist WAFs

Dangerous Virus & Malware Threats in 2023

Users risk losing their data because of the rapid development of viruses and malware threats

Virus and malware threats are constantly evolving and become more sophisticated and more dangerous over time; this makes it extremely difficult to maintain your data’s security. Unless you’re adequately protected, you risk to become a victim of the latest computer viruses and malware attacks. In addition, cybercriminals are relentless. They will stop at nothing to… Continue reading Dangerous Virus & Malware Threats in 2023

Huge Ransomware List by Gridinsoft Research – Part #2

Even more ransomware attacks you should know about

We talked a lot about notorious ransomware examples in Part #1 of this series. Still, it was not enough to reveal all noteworthy ransomware attacks. In Part #2, we will have a look at notorious attacks and ransomware families – several groups that use a single ransomware sample or its subspecies. More Interesting Ransomware Attacks… Continue reading Huge Ransomware List by Gridinsoft Research – Part #2

Huge Ransomware List by Gridinsoft Research – Part #1

History knows a lot of really noteworthy ransomware attacks

Ransomware is rightfully considered one of the most dangerous types of malware. It attacks individuals and companies, creating a mess in their files and paralysing their work. And even being such a devastating malware, it manages to have its own favourites. Let’s have a look at the most notorious ransomware attacks that ever happened. What… Continue reading Huge Ransomware List by Gridinsoft Research – Part #1