New Black Hat Asia Research: More than 70% of Security Professionals Predict a Major Data Breach Across Asian Countries in the Next Two YearsNew Black Hat Asia Research: More than 70% of Security Professionals Predict a Major Data Breach Across Asian Countries in the Next Two Years

New Black Hat Asia Research: More than 70% of Security Professionals Predict a Major Data Breach Across Asian Countries in the Next Two Years

7 years ago

Cyber attacks levels have raised concerning the IT security professionals across the globe, and Asia is not an exception to…

Let’s Encrypt Starts Offering Free Wildcard SSL Certificates that Work with Multiple Sub-domainsLet’s Encrypt Starts Offering Free Wildcard SSL Certificates that Work with Multiple Sub-domains

Let’s Encrypt Starts Offering Free Wildcard SSL Certificates that Work with Multiple Sub-domains

7 years ago

Let's Encrypt started issuing free Wildcard SSL certificate from yesterday through their updated version of ACME protocol Automated Certificate Management…

OceanLotus APT Hacking Group Distributing Backdoor to Compromise Government NetworksOceanLotus APT Hacking Group Distributing Backdoor to Compromise Government Networks

OceanLotus APT Hacking Group Distributing Backdoor to Compromise Government Networks

7 years ago

OceanLotus APT group as know as s APT32 and APT-C-00, emerging again targeting organization and government networks by distributing backdoor…

Microsoft Released Security Updates and more than 70 Security Vulnerabilities are FixedMicrosoft Released Security Updates and more than 70 Security Vulnerabilities are Fixed

Microsoft Released Security Updates and more than 70 Security Vulnerabilities are Fixed

7 years ago

Microsoft security updates released under patch Tuesday for this month (March) and fixed more than 70 vulnerabilities in all the…

Critical Vulnerability with CredSSP Protocol Affects WinRM and RDP on all Windows Versions to DateCritical Vulnerability with CredSSP Protocol Affects WinRM and RDP on all Windows Versions to Date

Critical Vulnerability with CredSSP Protocol Affects WinRM and RDP on all Windows Versions to Date

7 years ago

A critical remote code execution vulnerability with Credential Security Support Provider protocol (CredSSP protocol) that exploit RDP and WinRM on…

Avast Shares CCleaner Hack Investigation Report that Reveals Third Stage Payload with Keylogger CapabilitiesAvast Shares CCleaner Hack Investigation Report that Reveals Third Stage Payload with Keylogger Capabilities

Avast Shares CCleaner Hack Investigation Report that Reveals Third Stage Payload with Keylogger Capabilities

7 years ago

Avast shared the CCleaner hack investigation report at the Security Analyst Summit in Mexico, researchers said the malware was installed…

Hackers Can Remotely Control Your Camera to Monitor and Record All Your ActivitiesHackers Can Remotely Control Your Camera to Monitor and Record All Your Activities

Hackers Can Remotely Control Your Camera to Monitor and Record All Your Activities

7 years ago

A  dangerous flaw discovered in Popular Hanwha Smart camera's cloud server architecture that could allow an attacker to perform various malicious…

Cyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central AsiaCyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central Asia

Cyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central Asia

7 years ago

A new campaign with the similarities of MuddyWater spotted targetting organizations in Pakistan, Turkey, and Tajikistan. Attackers use various social…

With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial SectorsWith New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors

With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors

7 years ago

Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted…

Researchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to Install MalwareResearchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to Install Malware

Researchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to Install Malware

7 years ago

The researcher discovered a new flaw in Windows 10 lock Protection that allows attackers to access the Cortana Voice Commands…