Cyber Attacks

Memory Forensics The Key to Better Cybersecurity

Salesforce Health Cloud Provides Support for Medical Device Companies

The new pharmaceutical features will help companies to develop more direct relations with patients. On Tuesday, Salesforce launched new capabilities for its Health Cloud that target specific segments in the…

Read More
phishing scam

21 Million Stolen Fortune 500 Dark Web Purchase Credentials

Many studies and investigations have been conducted into the number of stolen credentials on the dark web. Nonetheless, a new report recently issued is a little different: it relies on…

Read More
Open EDR
A Guide to Cyber Security Salary

2,000 Cyber Attacks Affect Georgia Websites

About 2,000 websites in Georgia were compromised in a major cyber attack on Monday, including those of the President, courts and the press. The photograph of Georgia’s former exiled president…

Read More
Google Acknowledges Having Android Backdoor Triada

ACCC Says that Google Misleads Users about Managing Android Data Position

Consumer watchdog says Google gathers and uses location data without telling users. The Australian Competition & Consumer Commission (ACCC) is bringing up against Google and its Australian branch claims of…

Read More
After hacking data theft European Central Bank closes its website

Texas Man is in Jail for Hacking the Superior Court for 145 Months

A Texas man found guilty of hacking and abusing the LASC network for sending phishing emails was sentenced to a federal prison this week. The man, Oriyomi Sadiq Aloba, 33,…

Read More
Bulgarian IT Expert Arrested For Revealing Vulnerability in Software

Patches for Internet Explorer Zero-Day Causing Problems for Many Users

Microsoft released a new series of security patches in Internet Explorer for a zero-day bug, originally addressed on September 23. The original updates introduced some printing problems, but the new…

Read More
Macro Based Malware That Replaces Desktop Shortcuts to Install Backdoor

Cylance Security Researchers Warn Technology Firms in Southeast Asia for Chinese Open –Source Backdoor

Attackings of technology businesses in Southeast Asia by a suspected Chinese threat actor employ a version of the open-source PcShare backdoor, safety scientists in BlackBerry Cylance warn. The attackers also…

Read More
Advanced Persistent Threat What You Need to Know

Advanced Persistent Threat: What You Need to Know

Today, criminal organizations no longer attack corporations and businesses physically with weapons. Instead, they use computers and malware, aiming to steal vital information that can be used for malicious means….

Read More
Adwind Spyware as a Service Utility Grid Operators Attacks 1

Adwind Spyware-as-a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic grid infrastructure that spoofs a PDF attachment to deliver Adwind spyware….

Read More
Common Social Engineering Attacks and How to Prevent Them

Common Social Engineering Attacks and How to Prevent Them

Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals or…

Read More

Page 2 of 9

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register