Explore the mechanics of supply chain attacks, historical examples, and strategies to mitigate this growing cybersecurity threat.| zvelo
CL0P's latest extortion scheme involves the exploit of a zero-day vulnerability within MOVEit Transfer, a severe supply chain attack.| TXOne Networks
In this article, we’ll discuss the impact ransomware has on businesses and explain exactly how these attacks spread.| PurpleSec
The Clop ransomware group has claimed responsibility for exploiting the vulnerability to deploy a previously unseen web shell, LemurLoot.| Cisco Talos Blog
A technical blog post on finding and exploiting an authenticated JDBC deserialization vulnerability in JSCAPE MFT Server to gain remote command execution. This vulnerability is caused by an out-of-date H2 database library bundled into the default install package. A proof of concept is provided that works on Windows x64.| Markuta
Ransomware trends of 2023 include supply chain attacks, double extortions, law enforcement actions and challenges for the regulators.| BlackFog
The slow-moving disaster has ensnared some of the world's largest enterprises. Cybersecurity experts expect further damage to come.| Cybersecurity Dive
Updated June 16, 2023| Cybersecurity and Infrastructure Security Agency CISA
Unveiling the Dominance of Scams Amidst a 24% Surge in Blocked Attacks| Avast Threat Labs