What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

“CP3O” pleads guilty to multi-million dollar cryptomining scheme

A man faces up to 20 years in prison after pleading guilty to charges related to an illegal cryptomining operation that stole millions of dollars worth of cloud computing resources.

45-year-old Charles O Parks III (who went by the moniker “CP30” onlin…

FBI Sounds the Alarm over AI-Generated Scams

Cybercrooks are capitalizing on AI technology to improve their fraudulent schemes, the FBI said in a public service announcement.

“The FBI is warning the public that criminals exploit generative artificial intelligence (AI) to commit fraud on a larger…

Why You Should Secure Smart Gadgets Before Giving Them as Gifts

December is the month of gift-giving and generosity. Whether you’re thinking of donating to a charity or surprising family members and friends with smart tech such as wearables, smart speakers or phones, keep in mind the privacy and security risks of d…

Malware Analysis: A Kernel Land Rootkit Loader for FK_Undead

We discovered a Windows rootkit loader [F1] for the malware family FK_Undead. The malware family is known for intercepting user network traffic through manipulation of proxy configurations. To the best of our knowledge the rootkit loader hasn’t been of…

IT Pro Tuesday #331

Tabbed PuTTY, Tech Podcast, ARP Scanning & More
The post IT Pro Tuesday #331 appeared first on Hornetsecurity – Next-Gen Microsoft 365 Security.