Latest News

What is a Computer Virus? How They Spread and 5 Signs You’ve Been Infected

Computer virus definition A computer virus is a form of malicious software that piggybacks onto legitimate application code in order

How to Close SIEM Visibility Gaps Created by Legacy Apps

As companies get better at analyzing log data to spot potential security threats, legacy applications create blindspots that can be

iOS URL Scheme Expose Users to App-in-the-Middle attack

Security experts at Trend Micro have discovered that iOS URL scheme could allow an attacker to hijack users’ accounts via

Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of

UK Mid-Sized Firms Lost GBP30bn to Attacks in 2018

Cybersecurity incidents have cost UK mid-market firms a combined GBP30bn over the past year as automated attacks become the norm,

DoppelPaymer, A Fork of BitPaymer Ransomware, Appeared in the Threat Landscape

Some of the crooks behind the Dridex Trojan have split from the gang and released a forked version of the

US Coast Guard Issued Cyber-Safety Alert

The US Coast Guard recommended that ships update their cybersecurity strategies after a malware attack “significantly” degraded the computer systems

SPARTA – GUI Toolkit To Perform Network Penetration Testing

SPARTA is GUI application developed with python and inbuilds Network Penetration Testing Kali Linux tool. It simplifies scanning and enumeration

Media File Jacking – New Flaw Let Hackers Manipulate WhatsApp and Telegram Media Files in Android

A critical security flaw dubbed “Media File Jacking” affected WhatsApp and Telegram for Android let hackers manipulate both apps media

Critical Vulnerability in WordPress Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable

Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security

Sprint Revealed That Hackers Compromised Some Customer Accounts via Samsung Site

US telecommunications company Sprint revealed that hackers compromised an unknown number of customer accounts via the “add a line” website. The

A Flaw in Discontinued Lomega/Lenovo NAS Devices Exposed Millions of Files

Experts at Vertical Structure and WhiteHat Security discovered a serious flaw that exposed millions of files stored on thousands of

NCSC in DNS Warning as Hijackers Focus on Home Routers

The UK’s National Cyber Security Centre (NCSC) has issued a warning about DNS hijacking threats, as reports emerge of widespread

Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider

Web-based applications security relies on a number of factors among them is a Web Application Firewall (WAF). Cyberattacks are pouring

La Porte County Finally Opted to Pay $130,000 Ransom

On July 6, a ransomware attack brought down government computer systems at La Porte County, Indiana, finally, the county decided