Posts From Mo Moin

The figures aren’t encouraging: Recent reports have concluded that most employees don’t know much about cybersecurity best practices. The third-annual State of Privacy and Security Awareness Report, released by security education and training firm MediaPRO in 2018, found that 75%

How much should an organization spend on security? The simple answer: It depends. Factors such as the sort of business the company is in, the types of personal or sensitive data or intellectual property it handles, the regulatory requirements it

Google has been forced to remove 85 adware-laden gaming and photo apps from its official Play store which had been downloaded over eight million times. The Android custodian was informed about the adware by Trend Micro, which detected the new

A website that shares adult content has caused blushes of a different kind by leaking the private data of 1.195 million global users. An authentication failure on the website allowed unrestricted access to a database containing user names, locations,

Security researcher successfully Jailbreak the latest version of iOS 12.4 by taking advantage of the unpatched vulnerability that has been already fixed by Apple, and the Jailbreak creates an easy way to hack any vulnerable iPhone and iPad. Apple accidentally

VideoLAN has released VLC 3.0.8 with the fix for 13 security vulnerabilities that allows a remote attacker to crash the VLC player and to execute arbitrary code on the machine with the user privileges. The release fixes 13 security vulnerabilities

Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year. Webmin is an open-source web-based interface for system administration for Linux and Unix. It allows users using web browsers to

A study conducted by researchers at Cyjax revealed that organizations expose sensitive data via sandboxes used for malware analysis. Experts at the threat intelligence firm Cyjax analyzed file uploaded by organizations via malware analysis sandboxes and discovered that they were

Research giant Gartner Inc. has named BlackBerry a Magic Quadrant Leader for the forth consecutive year. The Canadian multinational is one of six vendors to be handed the title in 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report.

About the only thing shifting as fast as the cyber threat landscape is the typical enterprise’s org chart. As enterprises aim to keep pace with the rapidly evolving digital economy, many are restructuring internal departments, hiring criteria and the processes

The state of Texas has come under fire from a coordinated ransomware attack affecting over 20 local authorities. The Texas Department of Information Resources (DIR) released an updated statement over the weekend detailing its response to the attacks, which occurred

A new app dubbed Bluetana allows users to detect Bluetooth based skimmers hidden in gas pumps. These Bluetooth skimmers also attackers to connect the payment data safely by sitting inside a car. Skimmers are nothing but the malicious payment card

Police chiefs are warning of delays to investigations and court cases after it emerged that a ransomware attack on a forensic services firm led to a backlog of 20,000 cases. Eurofins Scientific, the largest provider of its kind in the

This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. “Active Directory” Called as “AD” is a directory service that Microsoft developed for the Windows domain network. Using

Researchers discovered nearly 85 malicious adware apps in Google play store that intended to upload for delivering adware and monetize from affected Android devices. These Fraudulent adware apps were installed over 8 million times from the Google play store, and

The DanaBot banking Trojan continues to evolve and spread across the continents, now moving from Australia to European countries. DanaBot is a multi-stage modular banking Trojan written in Delphi that first appeared on the threat landscape in 2018. The malware