Blog
What Will the Cyber-Security Threat Landscape Look Like in 2022?
Did you know worldwide cyber-security spending will be close to $133.7 billion by 2022? This prediction by Gartner Inc. is a response to growing...
An ongoing hack has been launched against IKEA’s email systems.
IKEA is fighting a hack in which threat actors are utilising stolen reply-chain emails to target employees in internal phishing assaults. Threat actors...
Want to Pursue a Career in Cyber Security in 2022? Four Things You Must Know!
With the increased focus on ransomware attacks and cyber-physical systems, more businesses are giving priority to risk leaders and security. After the...
Lookout Discovers a Global Campaign: Rooting Malware Makes a Comeback
The Lookout Threat Lab has discovered a new rooting malware that is available on Google Play as well as popular third-party stores like the Amazon...
CVE-2021-22205: GitLab Unauthenticated Remote Code Execution in the Wild
GitLab released a security update on April 14, 2021, to address CVE-2021-22205, a severe remote code execution vulnerability in the web interface. GitLab...
Pink was a botnet that contended with the vendor for control of the infected devices’ large numbers.
The majority of the following essay was written in early 2020, while the vendor was attempting to recover a significant number of infected devices. We...
Japanese Gamers Are Destroyed by a Chaos Ransomware Variant Found in a Fake Minecraft Alt List
The Posting of a Ransomware Lure on Japanese Minecraft ForumsGamers create "alt" (alternative) accounts in Minecraft for a variety of reasons (both good...
Infiltrating Windows: Infostealer Malware Disguised as a Windows Program
To detect and remediate threats, Rapid7's Managed Detection and Response (MDR) team uses specialised tools, malware analysis, tradecraft, and...
Pentaho Business Analytics Software Has Critical Flaws
Malicious actors might exploit multiple vulnerabilities in Hitachi Vantara's Pentaho Business Analytics software to upload arbitrary data files and...