Security News

Facebook Sues Two Ukrainian Developers for Data Scraping 1

Facebook Sues Two Ukrainian Developers for Data Scraping

Facebook has filed a suit against two Ukrainian browsing extension makers for data scraping. The suit has been filed on Friday, March 8 against two Kiev-based developers named Gleb Sluchevsky…

Read More
ICO Slaps Equifax with Maximum Fine for the 2017 Data Breach

Equifax’s Senate Investigation: What Went Wrong?

Remember Equifax? The ill-fated credit monitoring company, which fell to massive cyberattacks. The United States Senate Committee on Homeland Security and Governmental Affairs released their committee report titled: “How Equifax…

Read More
Open EDR
New Google Chrome Zero Day Vulnerability Detect

New Google Chrome Zero-Day Vulnerability Detected

A new Google Chrome zero-day vulnerability, which is being actively exploited in the wild, has been detected. Clement Lecigne, a security researcher who is part of Google’s Threat Analysis Group,…

Read More
How Businesses Desperately Fights Malicious Emails 1

“Nothing Is New” On How Businesses Desperately Fights Malicious Emails

Mimecast has released its newest Email Security Risk Assessment Quarterly Report (ESRA) for the first quarter of 2019, which can be summarized in one phrase: “nothing is new.” The overused…

Read More
Sub Saharan Africa’s SMEs A Growing Favorite Target Of Threat Actors 1

Sub-Saharan Africa’s SMEs, A Growing Favorite Target Of Threat Actors

When it comes to malware development and infection campaigns, it does not matter where the vulnerable computer systems are located. Malware in the wild are not limiting themselves to just…

Read More
Important Features of Vulnerability Scanners

Important Features of Vulnerability Scanners

To identify vulnerabilities that can compromise your security, performance, or functionality, you need to have a vulnerability assessment in place. It is a method used by a qualified provider of…

Read More
Implementing Operational Security The Process and Best Practices

Implementing Operational Security, The Process and Best Practices

procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…

Read More
The Best 10 Linux Distro for Penetration Testing

The Best 10 Linux Distro for Penetration Testing

If you are working as a security professional and interested in this specific field of knowledge, you must be known these top 10 Linux distro that suits your purpose. Remember…

Read More
Vulnerability Helps Researchers Expose Malware CC Servers

Vulnerability Helps Researchers Expose Malware C&C Servers

We usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around; the criminals are at the receiving end. A…

Read More
Printer Vulnerabilities Report Reveals Cybersecurity Risk

Printer Vulnerabilities Report Reveals Cybersecurity Risk

Quocirca, a market insight consulting firm has posted their Global Print Security Landscape 2019 report, which publicly revealed that 60% of corporate entities globally are exposed to data breach due…

Read More

Page 31 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register