Why YOUR software is the new malware Cybercriminals are increasingly turning away from malware and shifting to a stealthier approach known as Living Off the Land (LOTL). 1 minute
Introducing ThreatDown OneView free self-serve trial for MSPs We’re giving MSPs a 15-day, no-obligation trial to explore the OneView Platform on their own terms. 2 minutes
Ransomware in February 2025—Cl0p and RansomHub run riot The Cl0p ransomware group posted data on 335 victims in February 2025, by far the largest one month total any… 2 minutes
ThreatDown is Product of The Year ThreatDown Endpoint Protection is the first and only winner of the MRG Effitas Product of the Year award, after 13… 1 minute
Phishing, now available on your favorite app store! Although we tend to associate phishing attacks with emails, on Android they often come from innocent-looking apps. 1 minute
AI as you know it is dead, and cybersecurity will never be the same The arrival of autonomous “agentic” AIs could finally deliver the profound cybersecurity disruption many expected from ChatGPT in 2022. 2 minutes
Ransomware groups were faster, stealthier, and more active than ever in 2024 2024 was the worst year ever for big game ransomware. 1 minute
Ransomware in January 2024—bad news for US healthcare January 2025 saw some high profile attacks and no shortage of bad news for the US healthcare sector. 0 minutes
Ransomware in December 2024—Cl0p returns December 2024 saw the unwelcome return of the notorious Cl0p ransomware gang. 1 minute
Update now! Critical CVSS 10 vulnerability in Ivanti EPM Ivanti has released a fix for CVE-2024-29847, a deserialization of untrusted data flaw that allows remote code execution in its… 2 minutes
Ransomware gangs target SonicWall vulnerability SonicWall is urging customers affected by CVE-2024-40766 to "please apply the patch as soon as possible." 2 minutes
At last! Microsoft calls time on ActiveX in Office 2024 When Office 2024 is released next month, ActiveX controls will be off by default in client apps like Word, Excel,… 2 minutes
You have one minute to save your leaked AWS credentials New research suggests that cyber-thieves can discover and use leaked credentials in a matter of seconds. 3 minutes
Rise of Atomic Stealer signals a sea change in macOS malware Atomic Stealer is the most popular malware-as-a-service on macOS because of highly active affiliate-driven distribution campaigns and constant feature upgrades. 4 minutes
Patch now! Zero-day used to target ISPs and MSPs A patch is now available for a high severity vulnerability in Versa Director that can be used to compromise ISPs,… 2 minutes
Why complexity has become a security issue A new ebook from ThreatDown lifts the lid on the negative effects of complexity in the security environment, and what… 2 minutes
Ransomware group starts leaking Change Healthcare data The ransomware group that claims to have data stolen from Change Healthcare in February has begun leaking it online. 2 minutes
New ransomware group demands Change Healthcare ransom The Change Healthcare ransomware attack as suffered a third cruel twist. 3 minutes
3 important lessons from a devastating ransomware attack Three things you could learn from the cyber incident review produced by the British Library following its October ransomware attack. 4 minutes