security
How to Get Rid of Phishing Calls on Your Phone?
Discover how to spot and avoid phishing calls on your phone, protect your information, and take action if you fall victim to a scam.
Ransomware Attacks and Organizational Resilience: Structuring Prevention, Response, and Recovery
Ransomware is one of the main cybersecurity challenges faced by organizations of all sizes. According to estimates by the international consulting firm Cyberventures, damages caused by cybercrime,…
A Glimpse into Cyber Chaos: The World’s Most Devastating Malware Attacks
Malware attacks represent one of the most pressing threats, impacting individuals and organizations worldwide. These attacks, fueled by malicious software designed to infiltrate, damage, or take control…
Security Considerations in Codeless Automation Testing
Test Without Code Automation is an automated testing method that eliminates the need for writing traditional code to create, execute, or maintain the tests. Users can perform…
Chinese Hackers Steal Microsoft Signing Key to Target Govt. Orgs.
In April, Chinese hackers named Storm-0558 stole a Microsoft signing Key & used that key to break into the Government account from the Windows crash dump after…
U.S. Government Email Service Hacked in a Targeted Campaign
The threat intelligence solution firm Mandiant reports that Chinese hackers excessively targeted & broke into government & government-linked organizations in recent attacks that targeted Barracuda Email Security…
WPA2 Password, the Safest Form of Wifi Password?
Wireless networks are a necessity in today's hyperconnected world. WiFi is indispensable for seamless internet access everywhere we go, from offices to cafes to airports. It is,…
Linkedin Accounts Breached in a Hijacking Campaign
A report by Cyber intelligence firm, Cyberint mention numerous users have been complaining about their Linkedin accounts getting hacked or being lockout of their accounts and are…
Hacktivist Groups Exploit Diverse Funding Techniques for Political Operations
According to the cyberintelligence firm KELA report, hacktivist groups that work for political motives benefit from a variety of funding methods to carry out their operations. The…
What is Cyber Security? Things You Should Know?
Cybersecurity is becoming more and more crucial as technology permeates every aspect of our lives. Cybersecurity prevents unwanted access, theft, and damage to networks, electronic devices, and…
MOVEit Releases Patches for Several High-severity Security Vulnerabilities
Last month, it was discovered that threat actors, particularly the Clop ransomware group exploited a zero-day vulnerability in the Progress MOVEit File Transfer software. The MOVEit vulnerability…
BlackCAT Ransomware Group Pushes Malicious Installers via Malvertising
Security researchers at Trend Micro discovered that the BlackCAT, also known as ALPHV, is running malware-filled advertisement activities to entice people into fake websites that look like…
Threat Actors Use Trojanized Super Mario 3 Game Installer to Spread Malware
Security researchers at Cyble found that the threat actors are distributing an altered Super Mario 3: Mario Forever installer sample as a self-extracting archive executable through undisclosed…
Massive Data Breach: Over 100K Chat GPT Accounts Stolen, Warns Group IB
Cybersecurity researchers at Group IB reported that they had spotted more than a hundred thousand information Stealer logs on several underground websites containing Chat GPT accounts. For…
Russian Hacker Group Shuckworm Still Targeting Ukraine Security Orgs
Security analysts at Symantec, a part of Broadcom, reported that the Russian state-funded hacker group Gamaredon aka Shuckworm, is still targeting Ukraine's security organizations, such as military…
Royal Ransomware Uses the Blacksuit Encryptor to Attack Enterprises
Royal Ransomware is a ransomware group consisting of the pen-testers and the ones associated with Conti Team 1, and the other recruits from the other ransomware gangs…
End of content
No more pages to load