The Latest in IT Security

1

The RomCom RAT has been making the rounds — first in Ukraine as it went after military installations, and now in certain English-speaking countries such as the United Kingdom. Initially a spear-phishing campaign, the RomCom attack has evolved to include domain and download spoofing of well-known and trusted products. In this piece, we’ll break down […]

Read more ...

1

ChatGPT continues filling the headlines – but this time for all the wrong reasons, experts have warned. Cybersecurity researchers from Check Point Research (CPR) have observed the tool being used by cybercriminals to improve – and sometimes build from scratch – dangerous malware(opens in new tab) and ransomware. The team released the results of their […]

Read more ...

1

Cybercriminals have been spotted sideloading malware(opens in new tab) onto vulnerable Windows endpoints through a legitimate Windows Problem Reporting tool called WerFault.exe. According to researchers from K7 Security Labs, which first discovered the campaign, hackers (presumably from China) would send out a phishing email containing an ISO file. ISO is an optical disk image file […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments