Conquista Cyber

34 Results / Page 1 of 4

Background

todayMay 22, 2025

close

Threat Intelligence Conquista Cyber

DNS Hijacking Campaign by ‘Hazy Hawk’ Puts Major Organizations at Risk

A newly identified cybercrime group is exploiting abandoned cloud infrastructure to hijack subdomains and launch malicious campaigns under the names of trusted organizations. This threat actor, known as Hazy Hawk, is using overlooked DNS configurations to target enterprise brands and government entities alike—highlighting a growing blind spot in cloud security ...

todayMay 14, 2025

close

Internet Crime + Cybercrime Conquista Cyber

Scattered Spider Expands Ransomware Campaign to U.S. Retail Sector

A recent wave of cyberattacks has revealed that the threat actor group known as Scattered Spider is now actively targeting retail organizations across the United States. Previously focused on high-profile industries like hospitality and U.K. retailers, this shift marks a concerning trend in the ransomware threat landscape for American businesses. ...

todayApril 24, 2019

  • 55
  • 2
  • 106
close

Cyber security + Global news Conquista Cyber

NSA released Ghidra, its multi-platform reverse engineering framework

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 73
  • 2
  • 128
close

Blockchain Conquista Cyber

Technology Takeover: How to Secure IoT Environments

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 68
  • 4
  • 141
close

Cyber security + Global news Conquista Cyber

Why threat intelligence is the key to defending against Third party risks

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 50
  • 7
  • 117
close

Cybercrime Conquista Cyber

Expert found a DoS flaw in Windows Servers running IIS

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 55
  • 2
  • 189
close

Cyber security + Global news Conquista Cyber

Why Insider Threats Are One of the Biggest Security Risks

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 61
  • 192
close

Cybercrime Conquista Cyber

Shattered! Security in a Fragmented World of Workloads

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...