The Latest in IT Security

Posts Tagged ‘Cybercrime’

IT service providers use RMM applications to remotely manage their clients’ networks and endpoints, but threat actors are abusing these tools to gain unauthorized access to victim environments and perform nefarious activities. In malicious campaigns observed in 2022, threat actors sent phishing emails to deploy legitimate RMM software such as ConnectWise Control (previously ScreenConnect) and […]

Read more ...

Relatively new, SparkRAT is a multi-platform RAT written in Golang that can run on Windows, Linux, and macOS systems, and which can update itself with new versions available through its command and control (C&C) server. The threat uses the WebSocket protocol to communicate with the C&C server and includes support for over 20 commands that […]

Read more ...

Five Guys appears to have started informing customers on December 29, when it also notified state authorities about the incident. It’s not uncommon for companies to disclose cybersecurity incidents just before or during major holidays in an effort to avoid too much media coverage. However, Five Guys’ data breach notification was noticed by Turke & […]

Read more ...


Categories

FRIDAY, JANUARY 27, 2023
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments