The Institute for Critical Infrastructure Technology (ICIT) points out, in a paper warning of the evolution of what it calls’ disruptionware’ ransomware and the access to RDP as the current…
Read MoreThe Institute for Critical Infrastructure Technology (ICIT) points out, in a paper warning of the evolution of what it calls’ disruptionware’ ransomware and the access to RDP as the current…
Read MoreAdvanced Threat Protection, or ATP, is a type of security solution specifically designed to defend a network or system from sophisticated hacking or malware attacks that target sensitive data. ATP…
Read MoreBusiness processes today are largely dictated by the technology around them. Cloud computing, big data, and social media are just a few technologies that shape and affect a business as…
Read MoreOne of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive…
Read MoreA two-decades old security flaw in Windows and Office involving the Text Services Framework module named MSCTF has been publicly disclosed by Google’s Project Zero team. Initially, it was first…
Read MoreWe have repeatedly reported here in hackercombat.com about stories regarding email triggering malware intruding into the internal network and eventually leaking a considerable amount of personal information from data centers…
Read MoreThe network technology company, Cisco is set to pay a settlement agreement worth $8.6 million for an alleged violation of the U.S. False Claims Act (FCA). The case was brought-up…
Read MoreGreatHorn, an incident-response consulting firm has released their Email Security, Challenges, Trends and Benchmark Report 2019 revealing that the corporate world and email users, in general, has not yet learned…
Read MoreOn June 6, 2019, Google released a case study of very intelligent hackers who were trying to plant backdoor in Android phones. This is about a family of apps called…
Read More