Have Any Questions?
Call Now +353 1-211-8666
M&A

Category

close up view of system hacking
#1 The number of ransomware attacks will continue to growIn 2021, we observed an impressive number of ransomware attacks, and many major organizations were victims of cyber extortion.It is easy to predict that the number of ransomware attacks will continue to increase in 2022.As described by researchers from threat intelligence firm Advanced Intelligence, the restarting...
The latest report by Group-IB highlights the ways scammers operate.Scams and phishing remain two of the most alarming and dangerous ways that cybercriminals can leverage insight into people’s lives. It’s an indication of just how far it’s risen that Russian cybersecurity firm Group-IB has deemed it an “epidemic of online fraud” – an indication of...
Crowdstrike witnessed a Chinese espionage group, AQUATIC PANDA, using the Log4j bug (dubbed Log4Shell) to attack an unnamed academic institution.The Crowdstrike Falcon OverWatch team uncovered suspicious activity stemming from a Tomcat process running under a vulnerable VMWare Horizon instance at a large academic institution. The company didn’t name the institution but noted that it was...
With attacks predicted to increase exponentially throughout 2022, maybe we should all think before scanning the next QR code we encounter.Despite eliminating the need to type a URL on your smartphone and explore new innovative ways of engagement, marketers were forced to admit defeat and retire their obsession with quick-response (QR) codes. But a decade...
Cybercriminals have learned how to use copyright infringement notices as bait in phishing scams. This time, Sophos observed threat actors targeting Instagram users.Have you ever posted a photo on Instagram that wasn’t yours, maybe to get a bit more followers? If so, a message like this one below might scare you into taking action.“We recently...
This week Apple unveiled another beta program, but instead of offering early previews of software for your Mac, iPhone, or iPad, it’s a new initiative called Business Essentials. In line with Apple’s recent shift toward selling services, it’s a subscription package aimed at small businesses with three different plans and a move that has been...
Twitter has announced that the second version of its application programming interface, or API, is ready to come out of early access and become the default for developers. When Twitter announced API v2 in August 2020, it seemed like a chance to rebuild not only the infrastructure on which developers build their apps and bots,...
Apple is reportedly working on a new iPhone and Apple Watch feature that detects if you’re in a car crash and dials 911 automatically. The current plan is to roll out such a feature next year, according to The Wall Street Journal. Google’s Personal Safety app on Pixel phones already includes a feature to call...
What is it? Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts and allowed the installation of additional malware to facilitate long-term access...
I neglect my talents Far far away, behind the word mountains, far from the countries Vokalia and...
1 2