CyberSigna

Cyber Forensics and Research

  • About Us
    • Services
    • Tools
  • Trends
  • Cyber Threats Map
  • Cyber Attack Matrix
  • Resources
  • Contact Us

June 2022

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug | Threatpost

June 26, 2022 0

Advanced persistent threat group Fancy Bear is behind a phishing campaign that uses the specter of nuclear war to exploit a known one-click Microsoft flaw. Read More

Hackers steal $100 million from California cryptocurrency firm – CNN

June 26, 2022 0

Hackers have stolen the equivalent of $100 million from a California-based cryptocurrency firm in the latest big-money hack in the digital currency industry. This content Read More

You’ve Been Warned: Overlook Security Basics at Your Peril | Threatpost

June 24, 2022 0

Hackers are increasingly capitalizing on our volatile world—there was an increase in coronavirus-related phishing attacks in the pandemic’s early days as well as threats associated Read More

The Inevitable Need for Advanced Vulnerability Management | Threatpost

June 24, 2022 0

We have read enough and more news in recent times on the surge in cyberattacks. It is crystal clear that attackers are not leaving out Read More

7 Key Findings from the 2022 SaaS Security Survey Report | Threatpost

June 18, 2022 0

The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security Read More

In Cybersecurity, What You Can’t See Can Hurt You | Threatpost

June 18, 2022 0

The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need Read More

What the New OWASP Top 10 Changes Mean to You? | Threatpost

June 16, 2022 0

The Open Web Application Security Project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after 4 years. Read More

Conducting Modern Insider Risk Investigations | Threatpost

June 10, 2022 0

Dealing with risks presented by internal users requires a different approach than those from external threats. This shouldn’t be news to anyone, but it does Read More

Recent Posts

  • New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
  • How Attackers Can Own a Business Without Touching the Endpoint
  • GenAI: A New Headache for SaaS Security Teams
  • FISA reauthorization heads to Biden’s desk after Senate passage
  • BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool

Copyright 2025 | Digital Security by Cybersigna

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT