News

How cyber criminals are weaponizing psychology over malware with scattered spider, the techniques they are using, and the ...
The hackers work by impersonating IT and human-resources personnel to trick employees into sharing their personal information ...
Spider researchers in a new study found that the world-infamous parachuting joro spiders will attack and eat each other in certain conditions.
Scattered Spider is generally engaged in double-extortion attacks, exfiltrating sensitive files to third-party servers before encrypting the target infrastructure.
The teenage hackers behind Scattered Spider tend to launch attacks in waves against specific sectors - and it may be the retail sector's turn. See Also: Strengthening Your Security Program With Open ...