Criminals switch from macros to shortcut files to access business PCs

A wave of cybercriminals propagating malware families, including QakBot, IceID, Emotet, and RedLine Stealer, are switching to shortcut (LNK) files to deliver malware, according to HP Inc.’s quarterly Threat Insights Report.

Cohesity delivers FortKnox – a SaaS data isolation and recovery solution

Cohesity, a provider of next-generation data management, has announced the general availability of Cohesity FortKnox, a software as a service (SaaS) data isolation and recovery solution that complements the company’s Data Management.

Cybereason warns Global Organizations about Black Basta Gang

Evaluating lock-down of critical accounts when possible. The path attackers often take in propagating ransomware across a network is to escalate privileges to the admin domain-level and then deploy the ransomware.

TerraMaster launches New TOS 5 System with Higher Security

TerraMaster announces the global release of the new TOS 5 operating system on June 13, 2022.

Cyfirma to curb cybercriminals across ME with Tech First Gulf

DeCYFIR is an external threat visibility management platform that can combine cyber intelligence with attack surface discovery, vulnerability intelligence, brand intelligence, situational awareness, and digital risk protection.