Have Any Questions?
Call Now +353 1-211-8666
January 4, 2022

Day

close up view of system hacking
#1 The number of ransomware attacks will continue to growIn 2021, we observed an impressive number of ransomware attacks, and many major organizations were victims of cyber extortion.It is easy to predict that the number of ransomware attacks will continue to increase in 2022.As described by researchers from threat intelligence firm Advanced Intelligence, the restarting...
The latest report by Group-IB highlights the ways scammers operate.Scams and phishing remain two of the most alarming and dangerous ways that cybercriminals can leverage insight into people’s lives. It’s an indication of just how far it’s risen that Russian cybersecurity firm Group-IB has deemed it an “epidemic of online fraud” – an indication of...
Crowdstrike witnessed a Chinese espionage group, AQUATIC PANDA, using the Log4j bug (dubbed Log4Shell) to attack an unnamed academic institution.The Crowdstrike Falcon OverWatch team uncovered suspicious activity stemming from a Tomcat process running under a vulnerable VMWare Horizon instance at a large academic institution. The company didn’t name the institution but noted that it was...
Lapsus$ ransomware group attacked Impresa, one of the largest media groups in Portugal, causing several news outlets to shut down.The websites of Portugal’s biggest newspaper Expresso and major broadcaster SIC TV, are down because of the attack.At the time of writing, websites for both outlets claim that their services are unavailable. However, users on Twitter...
With attacks predicted to increase exponentially throughout 2022, maybe we should all think before scanning the next QR code we encounter.Despite eliminating the need to type a URL on your smartphone and explore new innovative ways of engagement, marketers were forced to admit defeat and retire their obsession with quick-response (QR) codes. But a decade...
Cybercriminals have learned how to use copyright infringement notices as bait in phishing scams. This time, Sophos observed threat actors targeting Instagram users.Have you ever posted a photo on Instagram that wasn’t yours, maybe to get a bit more followers? If so, a message like this one below might scare you into taking action.“We recently...
T-Mobile suffered from a data breach in a series of SIM swapping attacks, potentially leaving sensitive information of a small number of customers exposed. The incident comes just a few months after a massive breach affected 53 million customers back in August.According to the T-MO report, unauthorized activity on some of the customers’ accounts may...