BACKDOOR ATTACKS AND THREATS

OPERATION SHADOWHAMMER A latest backdoor threat to computer systems dropped and propagated via software updates is making rounds these days. Essentially a supply-chain attack, Operation...

THE MIMIKATZ THREAT

One of the latest threats to rock the cyber-word is the Mimikatz threat that adds more then a pep in the relentless and rapid strides of the hacker community.

EMERGING & TRENDING THREATS OF 2019

The year 2018 witnessed a massive escalation in cyber-crimes arising out of sophisticated threats and a constant evolution of malicious attacks taking advantage of lax security measures...

THREAT OF TAX SCAMMING ON CYBER-SPACE

MOBILE APPLICATIONS With handheld devices dictating almost all aspects of our lives, there are inherent threat associations that users should be aware of. One such latest threat...

ENCRYPTED MALWARE SPREAD

Web traffic has witnessed an exponential rise in encryption owing to privacy and data confidentiality concerns. This includes both legitimate and malicious traffic, the latter finding encryption as an effective...

COUNTERING THE VPNFilter THREAT

The VPNFilter targets IoT devices that include a large number of users who aren’t tech savvy to defend against such lethal threats by following even the minimum guidelines for countering...

THE VPNFilter THREAT

IoT has gained a strong footing in modern living by rapidly incorporating network connectivity into digital devices. This has naturally invited the interest of cyber criminals working to exploit loopholes...

ILLEGAL CRYPTO-MINING

WHAT IS CRYPTO-MINING Crypto-mining is an act of mining crypto-currency to yield financial benefits. Crypto-currency is virtual money that is distributed over cyberspace and doesn’t...

DEFENDING SYSTEMS AGAINST ILLEGAL CRYPTO-MINING

Crypto-mining has witnessed an exponential rise owing to handsome financial benefits it promises, even though stiff competition threatens to keep small-time miners out and forces sophisticated ones...

A PRIMER ON NEXT GENERATION FIREWALL (NGFW)

Cyber Security professionals are in a constant loop of a typical cat and mouse game with cyber criminals who are coming up with innovative strategies to intrude sophisticated security...
- Advertisement -

Latest article

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by...

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in...

Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

The German police yesterday raided the house of the developer of OmniRAT and seized his laptop, computer and mobile phones probably as...