REvil Ransomware Attacks on the Rise
Over the last two weeks, the REvil ransomware group has claimed to have infected nine organization across Africa, Europe, Mexico and the US. The organizations... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
Over the last two weeks, the REvil ransomware group has claimed to have infected nine organization across Africa, Europe, Mexico and the US. The organizations... Read More
The US FBI has issued a warning about an increase in cyberattacks on the education sector that are delivering the PYSA ransomware. In a “Flash”... Read More
A new variant of the Mirai botnet has been discovered targeting multiple vulnerabilities in unpatched D-Link, Netgear and SonicWall devices, as well as never-before-seen flaws... Read More
Researchers from Sucuri have discovered a new way that Magecart attackers are using to hide their online activity by saving data they’ve skimmed from credit... Read More
zoMiner is a malicious mining family that became active last year and have been publicly analyzed by the Tencent Security Team. zoMiner was initially active... Read More
Researchers at Intezer have uncovered a new, sophisticated, backdoor that is targeting Linux endpoints and servers. Based on the Tactics, Techniques, and Procedures, the backdoor... Read More
NanoCore is a high-risk RAT that provides attackers with details on the device name and OS. This information is used to carry out various malicious... Read More
Emerging in January of 2016, FIN8, a new financially motivated threat actor, made its entrance to the hacker scene. The s group is known to... Read More
Researchers at SecureList have discovered several fake apps delivering a Monero cryptocurrency miner to user’s computers. They are being distributed through malicious websites that may... Read More
The information below is a recap of a security bulletin distributed to all Atlas Clients and is also included in this report due to its... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..