Underwater sabotage: Are global powers targeting fiber-optic cables?
As wars rage on all around the world, the fog of war and accusations of sabotage continue to plague international…
As wars rage on all around the world, the fog of war and accusations of sabotage continue to plague international…
After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also…
Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that allows unauthorized…
Not long ago, the ability to remotely track someone’s daily movements just by knowing their home address, employer, or place…
Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup…
What if we told you that humans have been controlling the weather — or at least trying to — for…
It is imperative for executives and board members to know who their top allies are, and how to best leverage…
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
The cybersecurity landscape is a battlefield, but the biggest threats don’t always come from external hackers. As a seasoned warrior…
A new ransomware operation named 'Fog' launched in early May 2024, using compromised VPN credentials to breach the networks of…