What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

Researchers Discover New ‘StilachiRat’ Malware

Security researchers identified a new remote access trojan (RAT) used in digital recon, crypto theft, and data exfiltration campaigns.

Novel remote access trojan spotted in the wild

Microsoft cybersecurity researchers disclosed details of a novel RA…

Mandatory Coinbase wallet migration? It’s a phishing scam!

An ingenious phishing scam is targeting cryptocurrency investors, by posing as a mandatory wallet migration.

The emails, which have the subject line “Migrate to Coinbase wallet”, have been sent out at a large scale claiming that court order has forced…

‘Scamscriptions’: How to Recognize and Avoid Deceptive Subscriptions

Many of us rely on subscriptions for convenience, from streaming services to gym memberships – you name it. However, a growing number of scammers exploit consumers through hidden or misleading subscription schemes—often referred to as “scamscriptions.”…

Researcher Releases GPU-Powered Akira Ransomware Decryption Tool

A security researcher developed and released a decryption tool for the infamous Akira ransomware strain, using GPU to solve the deciphering key.

GPU-powered Akira decryption tool

Cybersecurity expert Yohanes Nugroho recently developed a tool that us…

Take-Two Takes Accuses PlayerAuctions of Selling GTA V Hacked Accounts

Take-Two Interactive, the publisher behind the immensely popular Grand Theft Auto franchise, has sued a third-party gaming marketplace PlayerAuctions, accusing them of selling hacked GTA V accounts, among others.

According to Take-Two, PlayerAuctions …

IT Pro Tuesday #343

The post IT Pro Tuesday #343 appeared first on Hornetsecurity – Next-Gen Microsoft 365 Security.