Posts From Mo Moin

Nearly half (48%) of organizations regularly push vulnerable code into production in their application security programs due to time pressures, while 31% do so occasionally, according to a new report published by Synopsys entitled Modern Application Development Security. As a

Two California cybersecurity companies have joined forces to help protect healthcare networks from cyber-threats. CynergisTek and Awake Security announced yesterday that they are pooling resources to develop an online threat assessment program that healthcare organizations can use to identify attacker

An investigation is under way into a data breach that impacted an online examination tool used by educational establishments around the world. The breach affected users of software made by American company ProctorU to provide live and automated online proctoring

There has been no shortage of Bluetooth related attacks disclosed in recent years, including BlueBorne and BadBlueTooth among numerous others. At the Black Hat USA 2020 virtual event on August 5, a new attack was added to the list of

In a session at the Black Hat USA 2020 virtual conference on August 5, Kevin Perlow, technical intelligence team lead for one of the largest banks in the US, explained how cyber-attackers are using public standards for financial transactions to

Recently, the U.S. government exposed Chinese surveillance malware “TAIDOOR” that are secretly used by the Chinese government for a decade. There has been a joint notice on TAIDOOR that has been revealed by the cybersecurity department of Homeland security (DHS)

In many cases, the simplest solutions are the best ones as well. However, when it comes to protecting your website from unauthorized access, you may want to go several steps further. Apart from tier-1 precautions like keeping your software up

A cyber-attack on Redcar & Cleveland Borough Council earlier this year has reportedly cost around GBP10m in recovery costs. The attack, which took place in February, caused online public services to be unavailable for 135,000 locals for over a week.

Cybercrime is growing at an “alarming pace” as a result of the ongoing COVID-19 crisis and is expected to accelerate even further, a new report from INTERPOL has found. It revealed the extent to which cyber-criminals are taking advantage of

Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that block ransomware. Initially, WastedLocker appeared this year in May, and it’s a part of the arsenal of the

More than 86% of web applications have critical vulnerabilities that can lead to resource compromise and theft of confidential information. Statistics show that a third of companies apply already on the fact of the first incident. Saving and ignoring information

North Dakota has suffered fewer data breaches than any other American state over the past 15 years. Analysis of data breaches that have occurred in the United States since 2005 revealed California to be the state hit by the highest

The number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019, according to new research. The rapid increase in this particular type of cyber-scourge was unearthed by threat analysts at Venafi, who gathered data on the misuse

Just under half of businesses have experienced at least one “business impacting cyber-attack” related to COVID-19 as of April 2020. According to research of 416 security and 425 business executives by Forrester Consulting and Tenable, 41% of respondents reported the

ZDNet reported in exclusive that a list of passwords for 900+ enterprise VPN servers has been shared on a Russian-speaking hacker forum. ZDNet has reported in exclusive that a list of plaintext usernames and passwords for 900 Pulse Secure VPN

Tanium has partnered with Google Cloud to integrate threat response and Chronicle’s security analytics platform. The partnership will unite the Tanium unified endpoint management and security platform with Google Cloud’s security analytics and zero-trust initiatives, which the companies claimed would