Canadian defense contractor Top Aces Inc became the victim of a ransomware attack. LockBit group, an infamous ransomware gang known for its strict principles, already claimed responsibility. They boasted of it by posting the logotype of this company on their Darknet site. More details about the Top Aces company Top Aces Inc is a defense… Continue reading LockBit attacks the Canadian defensive co. Top Aces inc
Tag: cyberattack
The 5 Most Famous Spyware Attacks
Spyware can be called the most sophisticated malware these days. It never acts openly, uses tricky techniques, and appears more often with other viruses. Together with its brother-in-law – stealer malware – spyware helps the cyber criminals to find and exfiltrate the data from attacked corporations. Moreover, ransomware that aims at individuals (exactly, STOP/Djvu family)… Continue reading The 5 Most Famous Spyware Attacks
NASA has faced 6000 cyberattacks in the past four years
NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the National Aeronautics and Space Administration. The document states that NASA has institutional systems that are used for the day-to-day work of employees (this includes data centers, web services, computers and networks). NASA also has separate… Continue reading NASA has faced 6000 cyberattacks in the past four years
Microsoft developed a SimuLand lab environment for simulating cyberattacks
Microsoft has developed an open source SimuLand lab environment to help testing and improving Microsoft 365, Defender, Azure, and Azure Sentinel protection against a variety of cyberattack scenarios. SimuLand enables “resources from a variety of data sources, including telemetry from Microsoft 365 Defender security products, Azure Defender, and other integrated sources through Azure Sentinel Data… Continue reading Microsoft developed a SimuLand lab environment for simulating cyberattacks
Who stands behind cyberattacks? Top 5 types of attackers
When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to… Continue reading Who stands behind cyberattacks? Top 5 types of attackers