Archive

The Human Factor has a fundamental importance for the success of a cyber attack, for this reason it is important to create a culture of cyber security within organizations. Every day we see a large number of tools being implemented

Cleveland Hopkins International Airport In U.S fell victim to a cyber attack on April 29th and officials have confirmed its a ransomware that had affected their systems for a while. There wasn’t any flight delays and security check hindrances but

Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering. We can use

A critical remote code execution vulnerability that exists with SupportAssist Client software allows attackers to gain access to vulnerable machines remotely. According to Dell, SupportAssist is an Automated, proactive and predictive client support software that checks system health and send

New exploits have been targeting SAP systems, allowing attackers to fully compromise the platform and delete all business application data, according to new research from Onapsis Inc. The exploits, dubbed 10KBLAZE, can potentially compromise all NetWeaver Application Server (AS) and

Legacy software vulnerabilities have created opportunities for hackers to steal credit card data and other personal information using tiny point of sale (POS) malware, according to research published by Forcepoint. Researchers reportedly analyzed 2,000 samples of POS malware and found

India’s leading outsourcing giant, Wipro, confirmed the security breach earlier this month as the company Employees’ were subjected to very advanced phishing activity. According to Flashpoint analysis, the attackers used many of the legitimate security applications used by penetration testers.

The UK government has introduced a proposed new law designed to improve IoT security-by-design and demand that retailers can only sell devices featuring an explanatory label for consumers. The new rules build on a voluntary code of practice introduced last

The Internet Society is urging IoT manufacturers to build stronger security measures into devices after releasing new research revealing that nearly two-thirds (64%) of British consumers have concerns over the way they collect personal data. The non-profit polled over 1300

As edge devices continue to be the target of malicious attacks, security experts have found an increase in brute-force attempts, according to a new white paper released by the Cyber Threat Alliance (CTA). Based on a compilation of research from

Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool. Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool that allows

Threat actors distribute malware by posting malicious ads that redirect users to the websites that offering malicious downloads disguised as document templates. The hacker group abused Yandex.Direct, an online advertising network to post the malvertising campaign and the malware hosted

Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed from their network during the security breach that reported in March. Citrix Systems, Inc.a well-known software company that provides server,

In recent times we have seen a numerous number of cyber attacks targeting the healthcare firm. For example the case of Oklahoma State University Center for Health Sciences (healthcare provider) had almost 279,865 individuals affected by the data breach, similarly,

Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into their partners’ security posture, according to new Accenture research. The consulting giant polled over 6600 IT and business executives in

A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar’ screen space by displaying its own fake URL bar when the user scrolls down the web page. Security researcher James fisher demonstrated