Cyber Attack

A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate CredentialsA New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were…

3 years ago
Threat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U softwareThreat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U software

Threat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U software

The cybersecurity researchers at Microsoft have recently identified a security flaw in SolarWinds Serv-U software that is exploited by the…

3 years ago
Prometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to TargetsPrometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to Targets

Prometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to Targets

The TDS (Traffic Direction System) of the Prometheus hacker group has been analyzed recently by the cybersecurity researcher of BlackBerry. …

3 years ago
How To Prevent Ransomware Attacks More Successfully?How To Prevent Ransomware Attacks More Successfully?

How To Prevent Ransomware Attacks More Successfully?

Ransomware is one of the most common cyber threats that attack both companies and private users. It works by encrypting…

3 years ago
What is a Supply Chain Attack & How it Occurs?What is a Supply Chain Attack & How it Occurs?

What is a Supply Chain Attack & How it Occurs?

When an organization adopts third-party or open-source code, it can unwittingly accept an extraordinary amount of risk originating upstream in…

3 years ago
Volvo Cars Servers Hacked – Attackers stolen Research and Development InformationVolvo Cars Servers Hacked – Attackers stolen Research and Development Information

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and…

3 years ago
Beware of new Malicious Chrome Extension that Delivers Password Stealer MalwareBeware of new Malicious Chrome Extension that Delivers Password Stealer Malware

Beware of new Malicious Chrome Extension that Delivers Password Stealer Malware

Several malvertising campaigns have been discovered recently by the security experts of Cisco Talos. In these malvertising campaigns, it has…

3 years ago
How Does Penetration Testing Fit into Your Security Strategy?How Does Penetration Testing Fit into Your Security Strategy?

How Does Penetration Testing Fit into Your Security Strategy?

In recent years, all kinds of organizations have faced cyber threats and attacks – from small cupcake businesses and blog…

3 years ago
How does the Advent of New Technologies Impact Information Security?How does the Advent of New Technologies Impact Information Security?

How does the Advent of New Technologies Impact Information Security?

The ever-evolving digital age affects information security more than most folks understand. The rate of cybercrimes has increased exponentially and…

4 years ago
Hackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – MicrosoftHackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – Microsoft

Hackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – Microsoft

Large-scale well-organized phishing as a service (PhaaS) operation is uncovered recently by Microsoft. This platform helps users to customize campaigns…

4 years ago