If you are a Robinhood user, this is what you should do now

“Socially engineered attacks are becoming more mainstream. In these cyberattacks, hackers use human interactions to carry out their malicious activities, psychologically manipulating people into making security mistakes or giving away sensitive information,” he said

Phishing attacks ramped up during pandemic, reveals Sophos

Phishing is often first step in complex, multi-stage attacks. According to Sophos Rapid Response, attackers frequently use phishing emails to trick users into installing malware or sharing credentials that provide access to the corporate network.

Conti ransomware gang: An overview

Conti ransomware stands out as one of the most ruthless of dozens of ransomware gangs that we follow. The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences.

Proofpoint reveals 72% of UAE CISOs feel unprepared to deal with a cyberattack

This year’s Voice of the CISO report examines global third-party survey responses from more than 1,400 CISOs at mid to large size organizations across different industries.

Hackers are using Telegram as a remote malware distribution center story

The attacker first creates a Telegram account and a Telegram ‘bot.’ A Telegram bot account is a special remote account with which users can interact by Telegram chat or by adding them to Telegram groups, or by sending requests directly from the input field by typing the bot’s Telegram username and a query.