cyber security
Volvo Cars Servers Hacked – Attackers stolen Research and Development Information
The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and in this data breach,...
cyber security
New zero-day in the Log4j Java Library Exploiting in Wide
In the popular Java logging library log4j (version 2) a new critical zero-day vulnerability was discovered recently, and this zero-day is a Remote Code...
cyber security
Simplifying Data Security in Modern, Multi and Hybrid Cloud Environments
In this rapidly changing technological world, cyber security has been a major concern for businesses moving to the cloud. However, cyber-attacks and cyber threats...
cyber security
VirusTotal Announced a New Feature Let Researchers To Create & Share IoCs
The VirusTotal has recently released a new feature, VirusTotal Collections, that will eventually fill the gap that generally occurred during investigations. However, as time...
cyber security
Beware of FluBot Android Malware that Targets Android Users Via SMS
The cybersecurity researchers of Finland Aino-Maria Vayrynen of the National Cybersecurity Center have recently published a "severe alert" to notify the country's Android users...
cyber security
Elements to Include in a Cybersecurity Strategy for any Size Business
Technology is moving so rapidly that the moment you feel like mastering one, its successor gets released in the market. The same challenge exists...
Computer Security
Best Proxy Extensions For Chrome
In many ways, proxies are the best tool to ensure your privacy and run various projects, such as web scraping or social media marketing....
cyber security
Tips to Plan an SSO Strategy for Your Business
Single sign-on can be important to implement in your business in the new year, along with other identity and access management solutions like multi-factor...