Skip to content
Friday, January 23, 2026
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Category: cyberattack

  • Home
  • cyberattack
77 percent of successful email attacks impersonate trusted platforms
  • Article
  • cyberattack
  • cybersecurity
  • DMARC
  • Email
  • Technology

77 percent of successful email attacks impersonate trusted platforms

  • 0

New research from StrongestLayer highlights a fundamental shift in attacker behavior, where adversaries increasingly hide behind business-critical platforms such as […]

The silent danger of SSH key mismanagement [Q&A]
  • Article
  • cyberattack
  • cybersecurity
  • Q&A
  • SSH key
  • Technology

The silent danger of SSH key mismanagement [Q&A]

  • 0

The recent AyySSHush botnet campaign compromised over 9,000 ASUS routers worldwide via SSH key injection. Unlike traditional botnets, this campaign […]

70 percent of major breaches caused by overlapping risks
  • Article
  • Breach
  • cyberattack
  • cybersecurity
  • Risk Management
  • Technology

70 percent of major breaches caused by overlapping risks

  • 0

New research from business risk specialist Panaseer shows that major breaches are being caused by toxic combinations — overlapping risks […]

Ransomware attacks on healthcare businesses increase 30 percent
  • Article
  • cyberattack
  • cybersecurity
  • healthcare
  • ransomware
  • Technology

Ransomware attacks on healthcare businesses increase 30 percent

  • 0

New research from Comparitech, based on data from its worldwide ransomware tracker, finds a 30 percent rise in ransomware attacks […]

Attackers weaponize workplace communication to install remote access tools
  • Article
  • communication
  • cyberattack
  • cybersecurity
  • Remote access
  • Technology

Attackers weaponize workplace communication to install remote access tools

  • 0

An ongoing phishing campaign is targeting organizations across multiple industries, usingsophisticated social engineering tactics to convincingly impersonate well-knownvideoconferencing platforms and […]

Off-the-shelf tools make life easier for phishing attackers
  • Article
  • cyberattack
  • cybersecurity
  • Phishing
  • Technology

Off-the-shelf tools make life easier for phishing attackers

  • 0

New research from Fortinet’s FortiGuard Labs highlights a recently identified phishing campaign that uses carefully crafted emails to deliver malicious […]

Why effective exposure management is key to cybersecurity [Q&A]
  • Article
  • cyberattack
  • cybersecurity
  • Modern Attack Surface Management
  • Q&A
  • Technology

Why effective exposure management is key to cybersecurity [Q&A]

  • 0

Thanks to the rise of hybrid working and SaaS the traditional concept of ‘attack surface’ — limited to hardware, software, […]

Cloud accounts come under attack as identity threats rise
  • Article
  • Cloud
  • cyberattack
  • cybersecurity
  • Identity
  • Technology

Cloud accounts come under attack as identity threats rise

  • 0

The latest Threat Detection Report update from Red Canary shows a rise of almost 500 percent in detections associated with […]

Matanbuchus 3.0 is a serious malware threat spread via Microsoft Teams
  • Article
  • cyberattack
  • Malware
  • malware loader
  • Matanbuchus
  • Matanbuchus 3.0
  • Microsoft
  • Microsoft Teams
  • ransomware
  • Security
  • Technology

Matanbuchus 3.0 is a serious malware threat spread via Microsoft Teams

  • 0

The Matanbuchus malware loader is not new – it has been around for at least 4 years – but it […]

Ransomware surges 63 percent in Q2
  • Article
  • cyberattack
  • cybersecurity
  • ransomware
  • Technology

Ransomware surges 63 percent in Q2

  • 0

The second quarter of this year has seen a 63 percent increase in publicly disclosed ransomware attack volumes, with a […]

Posts pagination

1 2 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.