
Blog Series
cyber attack

Bumblebee Malware Attacks: WebDAV Threat...
The frightening Bumblebee malware attacks have made a forceful return in the realm of cybersecurity, posing a major threat to organizations’ digital security. Following a brief absence, this renowned loader...
BlackCat ransomware exploits signed Windows...
Trend Micro has disclosed details about a ransomware attack that utilized the ALPHV/BlackCat virus. The attack employed a sophisticated technique involving the use of signed malicious Windows kernel drivers, enabling...
The Importance of Cybersecurity Training...
Cybersecurity threats are ever present and government organizations face unique challenges in securing the sensitive information of citizens. As workers with limited technology training become increasingly susceptible to threat actors,...
Maintaining Cyber Hygiene in the...
Reaching an acceptable level of cyber hygiene is a challenge for all healthcare providers, hospitals, and pharmaceutical companies. Many security breaches occur with legacy systems and redundant processes that often...
Remote code execution attack: what...
Cybercriminals use a range of strategies to target vulnerable systems – and remote code execution (RCE) attacks are one of the most common strategies. Indeed, according to the 2020 Global...