Home
About us
Articles
TRU Events
Acronis.com
TRU Security
Updates from Acronis Threat Research Unit
Home
About us
Articles
TRU Events
Acronis.com
TRU Security
All articles
All articles
Follow us on
Filter news by
Product
All
Acronis Cyber Backup
Acronis Snap Deploy
Acronis Files Connect
Acronis Disk Director Business
Acronis True Image 2021
Acronis Cyber Cloud
Acronis Cyber Infrastructure
Acronis Backup Advanced for vCloud
Acronis Monitoring Service
Acronis Cyber Cloud for Enterprise
Acronis VSS Doctor
Acronis Cyber Disaster Recovery
Acronis Disk Director
Acronis Cyber Notary Cloud
Acronis Revive
Acronis MassTransit
Acronis Cyber Files Cloud
Acronis Cyber Cloud Storage
Acronis Cyber Backup Cloud
Acronis Cyber Disaster Recovery Cloud
Acronis Cloud Manager
Acronis Cyber Files
Acronis Cloud Security
Acronis #CyberFit Score
Acronis Service Providers
Acronis Cloud Migration
Acronis AnyData Engine
Acronis Professional Services
Acronis Cyber Protect Cloud
Acronis Cyber Appliance
Acronis Cyber Protect
Acronis DeviceLock DLP
Acronis Ransomware Protection
Acronis Detection and Response
Acronis True Image
Acronis Cyber Protect Connect
Acronis Test Cyber Protect Renaming
Acronis Cyber Protect for Enterprise
Acronis Cyber Protect Home & Business
Acronis Cyber Protect for OT
No data
Year
All
2025
2024
2023
2022
2021
No data
Month
All
January
February
March
April
May
June
July
August
September
October
November
December
No data
Search by tag
Cybersecurity
Ransomware protection
Cyber protection
Malware protection
Cyberthreats
MSP cybersecurity
Antivirus protection
Data protection
Corporate cybersecurity
Cyber protection for businesses
Explore more tags
Search by keywords
Browse Cybersecurity Articles
April 08, 2022
WhatsApp phishing campaign uses fake voice messages
A new phishing campaign, which uses fake WhatsApp voice messages to trick victims into installing infostealing malware, has already targeted over 27,000 users.
April 08, 2022
New RAT "Borat" is a triple threat
A new remote access Trojan (RAT) by the name of Borat has been appearing on darknet markets. Borat is designed to be easy-to-use, and gives attackers the ability to deploy ransomware, perform DDoS attacks, bypass user account control (UAC), access files and network devices, and even take complete control of a victim's mouse and keyboard.
April 04, 2022
Lapsus$ gang releases 70 GB of stolen data
After taking a week off, the Lapsus$ extortion group came back in force with the release of 70 GB of data from IT and software development firm Globant — making the Luxembourg-based company the latest in a string of victims that include the likes of DHL, Facebook, BNP Paribas Cardif, and Citibanamex.
March 30, 2022
Urgent update issued for Google Chrome
Google has issued an update for its Chrome browser that patches the second "high severity" zero-day vulnerability this year. All 3.2 billion Chrome users are urged to update to Chrome 99.0.4844.84 for Windows, Mac, or Linux immediately.
March 30, 2022
Victims report cybercrime losses of $6.9 billion in 2021
The FBI's Internet Crime Report for 2021 contains statistics from 847,376 complaints, corresponding to more than $6.9 billion in losses. That represents a 7% increase from 2020.
March 25, 2022
Ransomware derails Italian train operations
The latest in a string of ransomware attacks has hit the computer systems of Italian railway operator Trenitalia, causing disruptions to ticket purchasing as well as the tablets and applications used by onboard staff members.
March 25, 2022
Lapsus$ extortion gang takes on Microsoft, Okta
Tech giant Microsoft and secure identity platform Okta have both joined the ranks of high-profile organizations that have recently fallen victim to the Lapsus$ extortion gang.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47