Posts From Mo Moin

Largest underground store “BriansClub,” for buying stolen credit cards got hacked, over 26 million credit and debit card data extracted from the underground store. BriansClub found to be sold more than 9.1 million stolen credit cards and the store earned

A US mailing technology company and one of France’s largest media groups have been hit by ransomware over the past few days, highlighting the continued threat to businesses of all types. Pitney Bowes, which provides services to print labels, track

Microsoft introduced the Tamper protection feature in Microsoft Defender ATP earlier this year. It is a new setting to protect against changes to key security features, including limiting changes that are not made directly through the app. Initially, Microsoft made

A British manufacturer of cybersecurity products is to be bought by American private equity firm Thoma Bravo for $3.8bn. Thoma Bravo, which raised billions for its latest private equity fund this year, bought Imperva and another cybersecurity firm, Veracode, in

Much has been made about the cybersecurity skills gap, and for good reason. There is a scarcity of cybersecurity professionals worldwide, which makes networks and those who depend on them—which is almost everyone—less safe. This is compounded by the fact

Tor Browser definition The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online. If you’re investigating a competitor, researching an opposing litigant in a legal dispute,

A leading analyst firm has warned British CISOs to focus on three key areas to mitigate the potential fallout from the UK’s departure from the European Union. Whether the UK strikes a withdrawal agreement with the EU or not, security

Security experts at ESET revealed that Winnti Group continues to update its arsenal, they observed that the China-linked APT group using a new modular Windows backdoor that they used to infect the servers of a high-profile Asian mobile hardware and

Microsoft has teamed up with the US National Institute of Standards and Technology (NIST) to develop a new guide designed to make enterprise patch management easier. Microsoft lead cybersecurity architect, Mark Simon, explained that the firm had first worked closely

A Florida clinic providing specialized medical care for women has alerted all current and former patients that their personal information and medical records may have been exposed following a data breach. North Florida OB-GYN, which joined Women’s Care Florida on

A new vulnerability has been discovered in the Linux Sudo program let unprivileged users can run the command as root by specifying the user ID -1 or 4294967295. Sudo (Superuser Do) program in Linux is responsible to allocate the security

Ransomware attack is quite common nowadays since Malicious software spreading everywhere through various mediums. The cybercriminals that use it are looking to do one thing, extort your money. Not unlike the movies, it usually starts with an ominous ransom note

Researchers have exposed the underhanded methods of a threat group responsible for unleashing a string of supply-chain attacks. Winnti Group has been targeting the gaming industry for nearly a decade. Their preferred mode of attack is to compromise game developers,

Security researchers have correlated the activity of a Chinese hacker group known for targeting aerospace companies to a multi-year espionage effort by China’s intelligence agencies to further the development of the country’s C919 aircraft, an airliner designed to compete with

New problems for Apple, most of its users likely ignore that the company is sharing iOS web browsing data on some of them to Chinese giant Tencent. Most Apple users likely don’t know that the tech giant is sending iOS

A security breach which led to the compromise of customer data at Imperva was caused by a stolen API key for one of its Amazon Web Services (AWS) accounts, the firm has revealed. The firm was notified of the incident,