by Liquid Video Technologies | May 17, 2021 | Cybersecurity, Data Breaches, Hacker, Malware, Security, Security Breach
The ransomware cyberattack against the Colonial Pipeline network has prompted the U.S. Federal Motor Carrier Safety Administration (FMCSA) to issue a regional emergency declaration in 17 states and the District of Columbia (D.C.). The declaration provides a temporary...
by Liquid Video Technologies | May 7, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
A malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variations of the malware are making their way into the world of...
by Liquid Video Technologies | May 5, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
In early April, security experts made public the details of yet another Facebook data breach, this one exposed over half a billion users. As originally reported by Business Insider, personal information on 533 million Facebook users spanning 106 countries surfaced in...
by Liquid Video Technologies | May 3, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
The U.S. and U.K. on Thursday formally attributed the supply chain cyberattack of IT infrastructure management company SolarWinds with “high confidence” to government operatives working for Russia’s Foreign Intelligence Service (SVR)....
by Liquid Video Technologies | Apr 30, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads. Dubbed “Saint Bot,” the malware is said to have first appeared on the scene in January 2021, with...
by Liquid Video Technologies | Apr 28, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach, Uncategorized
Microsoft has warned organizations of a “unique” attack campaign from IcedID malware that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what’s yet another instance of...
Recent Comments