Guardian Digital Blog - Page No: 6

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Ransomware Gangs: Lapsus$
In September of this year, the ride-share company Uber suffered a cyberattack where a threat actor infiltrated the organization’s internal systems. The culprit, who was a threat actor affiliated with the Lapsus$ extortion group, heavily relied on social engineering techniques in the incident.
What Is Deepfake Phishing?
Deepfakes use artificial intelligence (AI) to make convincing fake audio or video of a notable person, such as an executive or even the CEO. Deepfakes can make it appear that someone did or said something they never did.
Is Your Organization Vulnerable to Account Takeover?
Account takeover is an attack that involves threat actors stealing credentials to illegally gain unauthorized access to an account belonging to someone else. The victim is targeted because their account holds funds or access to products, services, or other sellable private information.
What Is Wiper Malware and Is It Worse Than Ransomware?
Ransomware attacks are considered one of the worst types of cyberattacks because of the severity of the damage they cause. With regular ransomware, there is at least the possibility of retrieving compromised files in many cases.
Apache SpamAssassin 4.0.0 Released with Improved Classification & Performance
The Apache SpamAssassin project has released version 4.0.0 of its renowned open-source anti-spam platform with numerous tweaks and bug fixes and improved classification, performance and handling of text in international languages. This release is an important milestone in the open source world, as Apache SpamAssassin has emerged as a testament to the security benefits of leveraging the open-source development model to combat the universal threat of spam email over the past two decades.
All You Should Know About Netwalker Ransomware
In the age of information technology, cybercriminals are developing advanced ransomware that employs sophisticated techniques to extort money — a development that constitutes a threat to everyone connected to the internet. Ransomware encrypts a victim’s files and demands a ransom for decrypting them.

Must Read Blog Posts

Latest Blog Articles

Recommended Reading