Business email compromise (BEC) groups are more heavily relying on attacks that impersonate third-party vendors or suppliers, as opposed to traditional attacks that mimicked executives.
An AvosLocker ransomware attack exploited the Log4j bug in VMware Horizon servers.
Daniel dos Santos, head of security research with Forescout, talks about a set of over 50 vulnerabilities discovered in operational technology (OT) devices from 10 different vendors.
An APT group dubbed ToddyCat has emerged to target Exchange servers in organizations across Asia and Europe.
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also getting better at tracking illicit cryptocurrency funds down.