Latest News
Hackers Exploiting Oracle WebLogic Zero-Day With New Ransomware To Encrypt User Data
Hackers exploiting the recently disclosed Oracle WebLogic Server remote code execution vulnerability to install a new variant of ransomware called
Most Important Cyber Incident Response Tools List for Ethical Hackers and Penetration Testers
Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident
Newly Emerging DDoS Botnet Attack on Electrum Takes 152,000 Hosts Under its Control
Newly Emerging DDoS botnet attack that targets one of the most popular bitcoin wallet Electrum and now it reaches the
Developer Reveals Phishing Exploit in Chrome
In a proof-of-concept (PoC) blog post published earlier this week, developer James Fisher disclosed a new phishing method in Chrome
Norsk Hydro Estimates March Cyber Attack Cost at $50 Million
Aluminum producer Norsk Hydro estimated the cost of the massive attack cyber attack targeting the company in March at around
Saint Ambrose Catholic Parish – Crooks stole $1.75M in BEC Attack
Crooks have stolen $1.75 million in a church BEC (Business Email Compromise) attack, the victim is the Saint Ambrose Catholic
Hackers Exploiting SS7 Protocol & Inject ATM Malware to Attack Banks and Financial Sectors
The Banking and Financial sectors were hit with a constant stream of cyber attacks when compared to any of the
Credential Stuffing Costs Firms $4m Each Year
Credential stuffing attacks are costing EMEA businesses on average $4m each year, according to new research from Akamai. The content
ElectrumDoSMiner Botnet Reached 152,000 Hosts
Researchers at Malwarebytes are monitoring the evolution of the ElectrumDoSMiner DDoS botnet that reached 152,000 infected hosts. MalwareBytes researchers are
80 Million U.S Households Sensitive Personal Data Exposed Online From Unprotected Mystery Database
An unknown mystery database exposed nearly 80 million U.S households data that impacting up to 65% of US households. Security
How the Industrial Internet of Things (IIoT) Puts SCADA Systems at Risk
The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA
How Does Cyber Threat Intelligence Benefits at Security Operation Centre Defense Phase
Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality
Security Flaws in P2P Leave IoT Devices Vulnerable
Malicious actors could exploit critical security vulnerabilities in a peer-to-peer (P2P) communications technology used across millions of internet of things
FinServ Sees 60% Spike in Business Email Compromise
Financial services organizations are increasingly targeted by attackers using impostor emails attempting to commit fraud, according to the 2019 Email
Quantum Computing Technology and Its Benefit for Cybersecurity – A Complete Analysis
When We talking about Quantum Computing, Human Brilliance has now brought the computers a long way, and it’s completely different
Microsoft Removes Password-Expiration Policy in Security Baseline for Windows 10
Microsoft presented a series of security enhancements for its Windows 10, including the removal of the password-expiration policy. Microsoft announced