QR Code-Based Attacks on the Rise as Usage Spikes
Ivanti, an industry leading IT software company, carried out a survey of 4,157 consumers across China, France, Germany, Japan, the U.K. and the U.S. It... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
Ivanti, an industry leading IT software company, carried out a survey of 4,157 consumers across China, France, Germany, Japan, the U.K. and the U.S. It... Read More
A new zero-day exploit, tracked as CVE-2021-22893, has been being used by threat actors and nation-state actors to launch cyberattacks against U.S. defense, financial, and... Read More
The Mozilla Foundation has fixed a flaw in its popular Firefox browser that allowed for the spoofing of the HTTPS secure communications icon, displayed as... Read More
GEICO Insurance, the second largest auto insurance provider in the United States claims that it has fixed a vulnerability that exposed private customer information from... Read More
Hackers are using search-engine optimization (SEO) tactics to lure business users to more than 100,000 malicious Google sites that seem legitimate, but instead install a... Read More
The US Federal Bureau of Investigation have cleared malicious web shells from hundreds of vulnerable computers in the United States that had been compromised via... Read More
A vulnerability in one of the Go libraries that Kubernetes is based on could lead to denial of service (DoS) for the CRI-O and Podman... Read More
Researchers from Sophos has discovered threat actors targeting compromised Exchange servers in order to host malicious Monero cryptominers. The payload for this attack was itself... Read More
In an odd display of the numerous impacts and fallouts from a successful ransomware attack, a recent attack on a food-logistics firm in the Netherlands... Read More
More information from the attack on SolarWinds continues to come out; current and former administration sources say the nation-state attackers were able to read Homeland... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..