Security experts at Proofpoint observed the notorious TA505 cybercrime group that has been using a new RAT dubbed SDBbot in

STOP (Djvu) ransomware has 160 variants that infected more hundreds of thousands of victims worldwide. Experts estimated a total number

Cisco released a security update for critical Authentication Bypass vulnerability that resides in the Cisco REST API virtual service container

The US ingredient provider Ingredion Incorporated revealed to have detected an ongoing malware attack after its experts noticed a suspicious

Italy is experiencing a rash of ransomware attacks that play dark German rock music while encrypting victims’ files. The musical

Five months on from a ransomware attack that brought the city to its knees, Baltimore has purchased cyber-insurance for the

A Trojanized version of the Tor Browser is targeting shoppers of black marketplaces in the dark web, threat actors aim

Security researchers at Crowdstrike conducted long-running cyber-espionage operations aimed at various aerospace firms. According to the experts the cyber espionage

In the world of cybersecurity, many companies that provide protection have moved away from preventing attacks to remediating them after

The UK government has revealed it is working with chip-maker Arm on a £36m initiative to make more secure processors.

Researchers discovered various unusual activities in UC Browser for Android and it abusing the Google play policies and exposing more

Security researchers have uncovered new activity from the notorious Kremlin-backed APT29, or Cozy Bear, group, in an information-stealing campaign targeting

The KRACK attack was published by two Belgian researchers in October 2017. The attacks are based on the weaknesses in

A study looking at cyber-attacks on the healthcare industry has found that 95% of targeted companies encounter emails spoofing their

The personal details of 250,000 American and British jobs seekers have been exposed after two online recruitment companies failed to

Security experts at Cyberbit have uncovered a crypto mining campaign that infected more than 50% of the European airport workstations.

For the first time in history, researchers have discovered a crypto-jacking worm that spreads via unsecured Docker hosts. Researchers at

Global fraud attacks soared by 63% from the second half of 2018 to the first six months of this year,


IT Security

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses

In 2008, Bernie Madoff admitted to masterminding an $80 billion Ponzi scheme — a scheme that should have made many


In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA


In the latest major cloud security foul-up, Capital One suffered a data breach, which affected 100 million people in the

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the



Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...