Microsoft Announces SolarWinds Hackers Have Downloaded Its Source Code

The hackers who used SolarWinds software to conduct a cyber attack against the U.S. federal supply chain in 2020 also gained access to Microsoft’s internal network. They used accounts to view repositories containing source code for Microsoft products, although they weren’t able to change any of this code. The software giant also reported the incident had little effect on the …

Everything You Need to Know about the Conti Ransomware Gang

Conti ransomware first appeared in May 2020 and has become increasingly sophisticated since then, according to Cybereason. Attacks by this malware are particularly damaging due to the speed with which it encrypts data and spreads to other systems. Preventing Conti attacks requires general measures to detect it and specific techniques defeat an attack that’s already in progress.

5 Tips to Make your Passwords More Secure

An organization’s infrastructure is only as secure as the passwords protecting it. Poor password practices make it easy for hackers to access sensitive information, which is especially damaging in the case of financial data. Strong, unique passwords are essential for any account, so most organizations have established guidelines for creating passwords. These guidelines should generally focus on making passwords easy …

DDoS Attacks Take over Computer to Mine Cryptocurrency

Countless people have become fascinated with the current values of cryptocurrencies, like Bitcoin. With popularity comes security vulnerability and hackers looking to take advantage of unsuspecting victims.

3 Security Threats That Will Affect Many Businesses in 2021

There are numerous security threats that companies might encounter, making it difficult to decide which ones to address first. Here are three threats that deserve attention because they are not only dangerous but also prevalent.

PDF Viewers are Susceptible to these Attacks

The vast majority of PDF viewers are vulnerable to a variety of attacks, according to researchers at Ruhr University Bochum in Germany in a 2021 study. These techniques exploited standard features of PDF that are generally familiar to most hackers. In the most serious cases, researchers were able to execute code remotely, read data and manipulate it. Fortunately, a number …

DreamBus Botnet Infiltrating Enterprise Applications on Linux Servers

At its core, a botnet is a network of computers that have been hijacked from their users and infected with malware. The hackers can remotely control this anywhere in the world. Afterwards, they can use the network to send out spam, and launch DDoS (distributed denial of service) attacks. What’s worse, the bot network may be rented out to other …

Ransomware Cybergangs Are Now Calling Their Victims

After successfully infecting companies’ IT networks with ransomware, some cybergangs are now calling those businesses to intimidate them into paying the ransom. Find out more about this troubling development.

3 Digital Trends to Keep in Mind in 2021

As a business professional, it is helpful to learn about current trends that can affect your company. Here are three digital trends to keep in mind in 2021.