Intersec Saudi Arabia
SECURITY REGIONAL EVENTS April 18, 2017

Intersec Saudi Arabia

Training Courses
Network Security April 6, 2017

Training Courses

Threat landscape
Home Page Banner April 6, 2017

Threat landscape

A newly discovered ransomware family was found to be using the NSA-linked EternalBlue exploit for distribution and is capable of

Researchers have finally been able to create a decryptor for the WannaCry ransomware that has affected more than 3,00,000 computers

A fast-moving wave of ransomware attacks is hitting hard across the world, exploiting a recently patched vulnerability that was exposed

A ransomware variant called WanaCrypt0r 2.0, also known as WanaCry or WCry, has locked up over 75,000 computers in 99

If you have recently downloaded the popular open source video transcoder app HandBrake on your Mac, there are chances that

A ‘phishing’ scam that tricked people with what appeared to be Google Docs links was doused by the internet giant

Cybercrime is quickly shifting to the mobile space as mobile device malware infections reached an all-time high in 2016. According

Microsoft on Tuesday announced the general availability of its phone sign-in for customers with Microsoft accounts — a system that

SWIFT said yesterday that there are no signs of foul play in its network or messaging systems following last week’s

A new dark web ransomware-as-a-service (RaaS) has been uncovered by security researchers, which according to experts, is selling a new

Intersec Saudi Arabia

Intersec is entering the ever growing Saudi Arabian security industry by launching Intersec Saudi Arabia, under the patronage of HRH

If you’ve installed Windows 10, or bought Microsoft Office, or set up an Outlook email address, chances are you’ve got

The hacker group calling itself “Shadow Brokers” has made public another batch of files allegedly obtained from the NSA-linked threat

Files released by the mysterious hacker Shadow Brokers suggested Friday the US National Security Agency had penetrated the SWIFT banking

Training Courses

Technical Training Courses Looking for a course that fits your particular needs? Browse a catalog of the courses offered through

Threat landscape

The FortiGuard Labs threat research team analyzed real-world threat data from around the globe to create this insightful report. It

Google this week released security updates for Android to resolve numerous Critical remote code execution (RCE) and elevation of privilege

There are more than three dozen previously unknown flaws that pose a potential threat to consumers using some Samsung TVs,

Researchers at Cisco Talos have reported finding a high severity code execution vulnerability in the LabVIEW system design software from

Gmail users in recent months have been targeted by a sophisticated series of phishing attacks that use emails from a

In a research paper published at the end of February, a team of five scientists from the Graz University of

Wikileaks has released a massive stash of confidential documents in what could be the biggest ever leak involving the Central

Reimagine IAM to Accelerate Digital Business Identity and access management must address growing technology relationships across digital business initiatives. In

Yes, Google’s Project Zero team has once again publicly disclosed a vulnerability (with POC exploit) affecting Microsoft’s Windows operating systems

Someone calling themselves “Pro_Mast3r” managed to deface a server associated with President Donald Trump’s presidential campaign fundraising on Sunday, The

Security researchers have discovered that it is easy for attackers to gain access to millions of cars, simply by hacking

Self-healing malware isn’t new, with the first such threat reportedly spotted nearly three decades ago, as the memory-residing Trojan called

FOR THE LAST decade or so, hackers have faced a daunting challenge when they try to break into a computer:

MEITU IS A popular app that transforms your selfie into an adorable anime character. You’ve probably already downloaded it. In

The beginning of 2017 has brought a series of changes on the malware charts, as the Kelihos botnet managed to

COMPLIANCE

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal

 
 

FEATURED

A fast-moving wave of ransomware attacks is hitting hard across the world, exploiting a recently patched vulnerability that was exposed

Microsoft on Tuesday announced the general availability of its phone sign-in for customers with Microsoft accounts — a system that

Intersec Saudi Arabia

Intersec is entering the ever growing Saudi Arabian security industry by launching Intersec Saudi Arabia, under the patronage of HRH

 


____________________________________________________

Signup for our newsletter and get access to our latest cybersecurity News, Event and jobs.

Email address
Secure and Spam free...