Cyber Resource Library

Filter by tag to learn more about a particular topic.
Artificial Intelligence

Artificial Intelligence and Ransomware Threats

Today, the National Cyber Security Centre (NCSC), part of the Government Communications Headquarters (GCHQ), released a report highlighting the...

Read More
Trello Hack

Hacker Scrapes 15 Million Trello Profiles Through API

Approximately 15 million names, usernames, and email addresses linked to public Trello boards have surfaced on the Dark Web for sale, posing a risk...

Read More
Banking Impersonation

Warning: Banking Impersonation Scams Targeting Corporate Executives

In recent times, an elusive group of scammers has emerged, adopting a sophisticated strategy to impersonate banking personnel, preying on both...

Read More
phishing

Russian Hacker Group ‘Star Blizzard’ Upgrades Phishing Stealth, Research Uncovers

State Sponsored Villains “Star Blizzard” (aka Seaborgium, BlueCharlie, Callisto Group, Coldriver) has been actively involved in cyber espionage since...

Read More
cyber phishing

Russian Military Hacker Group Target NATO Allies

Ukraine’s Computer Emergency Response Team (CERT) has issued a warning about a new phishing campaign orchestrated by Russia-linked hackers,...

Read More
cyber incident response

Cyber Incident Response

Cyber Incident Response Reporting Catalogue and report the breach.

Read More
cyber hacker

SEC Slaps Morgan Stanley with $35M Fine for Selling Unwiped and Unencrypted Hard Drives on Auction Sites

Morgan Stanley has agreed to pay a $35 million penalty to the Securities and Exchange Commission (SEC) for data security breaches. These breaches...

Read More
email spoofing example

Common Email Spoofing Attempts

Phishing and Spoofing are two of the most prevalent types of cyber-attacks used by malicious actors against businesses and organizations today.

Read More
Malicious ads creep into Bing Chat responses

Bing Chat Adds May Be Directing You to Malicious Links

Malwarebytes researchers conducted a test on Bing Chat by typing a simple query: “download advanced IP scanner.”

Read More
cyber security model

Why is EDR Important?

EDR is important for IACs as it helps them detect and prevent cyber threats from endpoints. With EDR, IACs can quickly identify anomalies, such as...

Read More
LockBit Cyber Security

LockBit on the Prowl of Industry Titans

In a striking incident that caught the attention of IAC companies, the renowned Russia-linked ransom gang LockBit has launched an audacious attack on...

Read More