Miami-based Tech Company, Intcomex, Suffers Massive, 1TB Data Breach
Miami-based tech company, Intcomex, has suffered a massive, 1 terabyte data leak of its users’ data. The data leaked includes credit cards, passport and license... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
Miami-based tech company, Intcomex, has suffered a massive, 1 terabyte data leak of its users’ data. The data leaked includes credit cards, passport and license... Read More
Since July 2020, the Zscaler ThreatLabZ team has observed an increase in targeted attacks against multiple supply chain-related organizations in the oil and gas sector... Read More
In Summer 2020, Kaspersky ‘SecureList’ uncovered a multi-module C++ toolset used in a highly targeted industrial espionage attack dating back to 2018. The research team... Read More
Emotet is an advanced Trojan malware that is primarily spread via phishing email links and attachments that, once engaged with by the victim, launches its... Read More
Unit 42 from Palo Alto networks discovered a new variant of crypto jacking malware dubbed Black-T, spawned by TeamTnT. The malware authors who have been... Read More
First discovered in 2017, the APT-C-23 group is an APT actor group known for its distribution of malware-laced Android applications. Compared to the ones documented... Read More
In mid-June, Avast researchers noticed a surge of Meh and MehCrypter infections in Spain, with several thousand attempts were being blocked a day. Meh and... Read More
First discovered in late 2019, Mispadu is a banking trojan that is written in Delphi and targets potential victims using fake pop-up windows, with the... Read More
In a report by Checkpoint, we now learn the Lucifer is a Windows crypto miner and DDoS malware that is multi-platform and multi-architecture and is... Read More
MobileIron’s mobile device management (MDM) allows a company to secure, manage, and monitor any corporate or employee-owned mobile device or desktop tat accesses critical business... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..