New York-Based Facial-Recognition Technology Ruled Illegal in Canada
Clearview AI’s controversial practice of scraping the Internet for billions of images of people has been ruled illegal in Canada. The joint investigation of privacy... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
Clearview AI’s controversial practice of scraping the Internet for billions of images of people has been ruled illegal in Canada. The joint investigation of privacy... Read More
TeamTNT is a cybercrime group known for cloud-based attacks and has targeted Amazon Web Services credentials in order to gain access to the cloud for... Read More
In 2019, researchers documented a cloud-targeting malware used by the Rocke Group to conduct cryptojacking attacks to mine for Monero. Due to the increased scrutiny... Read More
The US Department of Justice announced Wednesday that it has brought charges against a Canadian national in relation to recent NetWalker ransomware attacks. It also... Read More
Devices that are disconnected from the Internet are now vulnerable thanks to a new version of a known NAT slipstreaming attack. This would allow remote... Read More
Discovered in early 2015, the ‘Groundhog’ DDOS botnet began its spread using SSH brute force attacks. Researchers at Lacework believe that the botnet is rapidly... Read More
Proofpoint Threat Researchers discovered attacks using Google Forms to bypass email security content filters, which work off known keywords. The use of Google Forms is... Read More
First discovered in September 2020, the MrbMiner campaign involves the downloading and installing of a crypto miner on thousands of SQL servers. Sophos researchers have... Read More
In the follow up to the Christmas Eve attack that left the Scottish Environmental Protection Agency with encrypted files, the attackers have now released the... Read More
While the attack is your typical phishing scam, the threat actors behind it left more than 1,000 stolen credentials available online via simple Google searches.... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..