Threats in three minutes

  •  

    Conti ransomware

    Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology...

    Play now
     
  •  

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks...

    Play now
     
  •  

    US government probes VPN hack within federal agencies

    On April 29, 2022, the United States government investigated a hack against federal agencies...

    Play now
     
  •  

    Qakbot malware

    First discovered in 2007, Qakbot is widespread malware used for stealing information. However, in recent times, detection of Qakbot malware has been...

    Play now
     
  •  

    Emotet malware

    Originally developed as a banking trojan in 2014, Emotet malware was once described as the world's most dangerous malware. What makes this malware...

    Play now
     
  •  

    Cobalt Strike

    Created in 2012 by Raphael Mudge, Cobalt Strike is a remote access tool developed for ethical hackers to enable threat simulation security...

    Play now
     
  •  

    Mimikatz

    Mimikatz is an open source application that allows users to view and save authentication credentials. Benjamin Delpy originally created Mimikatz...

    Play now
     
  •  

    REvil Ransomware

    Belonging to the Cryptomix ransomware family, Clop ransomware is a dangerous file encrypting that encrypts saved files...

    Play now
     
  •  

    TrickBot

    Originally designed by a group of sophisticated cybercriminals as a banking Trojan to steal financial data,...

    Play now
     
  •  

    Colonial Pipeline attack

    Colonial Pipeline, a jet fuel and gasoline provider for the eastern United States, was the victim...

    Play now
     
  •  

    Clop ransomware

    A California-based information security and compliance firm, Qualys, confirmed that it was victim...

    Play now
     
  •  

    Mirai malware

    Mirai malware infects devices that run on the ARC processor, turning them into a network...

    Play now
     
  •  

    IcedID Malware

    IcedID, aka BokBot, is a banking trojan-type malware that can be used by attackers to steal...

    Play now
     
  •  

    SocGholish

    SocGholish is an initial access threat that uses drive-by-downloads that are disguised..

    Play now
     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.