Washington, DC – Today, CISA, the Federal Bureau of Investigation (FBI), Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National…
exploitation
HealthEC LLC a New Jersey based health technology company reported a data breach that impacted nearly 4.5 million patients across…
The Justice Department announced today a disruption campaign against the Blackcat ransomware group — also known as ALPHV or Noberus…
“The incident may have affected approximately 500,000…
CONCORD – A Derry man pleaded guilty in federal court in Concord to passport fraud and wire fraud in connection…
What is the Mitre ATT&CK Framework? The Mitre ATT&CK Framework describes the techniques, tactics and procedures that hackers use to…
Seemingly Benign Programs used for Hacking Hackers use seemingly benign programs for Nefarious Purposes. Hackers manipulate and repurpose software and…
In a universe (not so far away), where passwords like “123456” and “password” reigned supreme, our hero, NIST 800-63B, stepped…
Introduction: Ransomware has become a prevalent and damaging threat in the world of cybersecurity. This malicious software aims to encrypt…
Introduction In the quest to strengthen cybersecurity defenses, organizations have turned to various solutions such as SIEM, XDR/MDR, and SOAR….