What is Maze ransomware?
Maze is a strain of ransomware* that has been impacting organizations since 2019. Although one main group created Maze, multiple attackers have used Maze for extortion purposes. In addition to…
Your Go-To Source for Cyber Security Insights and Solutions
Maze is a strain of ransomware* that has been impacting organizations since 2019. Although one main group created Maze, multiple attackers have used Maze for extortion purposes. In addition to…
Krasue infects telecom firms in Thailand using techniques for staying under the radar. Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for two years…
The Open Web Application Security Project maintains a regularly updated list of the most pressing security concerns. What is OWASP? The Open Web Application Security Project, or OWASP, is an…
Authentication is the process of verifying identity. It requires using passwords, hardware tokens, or several other methods. In cyber security, authentication is verifying someone’s or something’s identity. Authentication usually occurs…
A DNS flood is a DDoS attack that aims to flood and overwhelm a target DNS server. What is a DNS Flood? Domain Name System (DNS) servers are the “phonebooks”…
Click fraud fakes clicks target pay-per-click ads, boosting webpage search rankings or artificially inflating the popularity of a post. Click bots are often responsible for click fraud. What is click…
A bot is a software program that operates on the Internet and performs repetitive tasks. While some bot traffic is from good bots, bad bots can negatively impact a website…
Indicators of compromise (IoC) are evidence left behind by an attacker or malicious software that can be used to identify a security incident. Indicators of compromise (IoCs) are information about…
Heuristics came to public attention when Daniel Kahneman published his best-selling book “Thinking, Fast and Slow”. In it, Kahneman summarized the findings from his decades-long collaboration with his research partner…
A zero-day exploit is an attack that takes advantage of a mostly unknown security vulnerability. What is a zero-day exploit? A zero-day exploit (also called a zero-day threat) is an…