Phishing attacks ramped up during pandemic, reveals Sophos

Phishing is often first step in complex, multi-stage attacks. According to Sophos Rapid Response, attackers frequently use phishing emails to trick users into installing malware or sharing credentials that provide access to the corporate network.

Hackers swipe almost $100 million from major cryptocurrency exchange

Japanese cryptocurrency exchange platform Liquid has fallen victim to enterprising hackers who compromised its warm wallets and made off with more than US$97 million in various cryptocurrency assets.

The Future of Cryptocurrency: What to Expect?

Cryptocurrency is a digital currency that’s created and managed with cryptography, an encryption technique. This currency first started with Bitcoin, but now there are many different types of crypto available.

VeritasTM rewards channel for solving ransomware & multi-cloud challenges

“Veritas is the global market leader in data protection and with the improved financial benefits and stronger engagement, we can solve our client’s challenges faster with these data protection products,” said Juan Orlandini.

Understanding REvil: The ransomware gang behind the Kaseya attack

REvil threat actors typically deployed ransomware encryptors using the legitimate administrative tool PsExec with a text file list of computer names or IP addresses of the victim network obtained during the reconnaissance phase.