Security News

Counter Phishing Attacks with These Five Tricks

Counter Phishing Attacks with These Five Tricks

Forgot to lock your office, never mind you have a much bigger security concern to worry about, for example, phishing attacks. In 2017 nearly 76 percent of the business across…

Read More
What Went Wrong The Zoho CRM Downtime of 2018

What Went Wrong: The Zoho CRM Downtime of 2018

Customer Relationship Management vendor, Zoho went offline after its registrar applied for a suspension order, due to a phishing issue. TierraNet deliberately took down the zoho.com domain as a countermeasure…

Read More
Open EDR
Indian Corporates Should be Wary of Email Based Threats

Indian Corporates Should be Wary of Email-Based Threats

The focus today is on the Indian corporate scenario. The HackerCombat research team, ever on the go, has been analyzing the current cybersecurity landscape in India, with special focus on…

Read More
No Takers for Zero Day Vulnerabilities on the Dark Web

No Takers for Zero-Day Vulnerabilities on the Dark Web

According to experts vulnerability sales have been all but driven off the dark web, which now operates in the open. For years the secretive market for zero-day exploits thrived in…

Read More
60 Billion Worth of Cryptocurrency Stolen in the Zaif Cyberheist

$60 Billion Worth of Cryptocurrency Stolen in the Zaif Cyberheist

Japanese cryptocurrency exchange, Zaif is hacked to the tune of 6.7 billion yen or $60 million dollars worth of crypto coins by cybercriminals. The heist incident happened between 5 pm…

Read More
Malicious Weaponized Version of SnowBox App Spreading in the Wild

Malicious Weaponized Version of SnowBox App, Spreading in the Wild

For those that don’t want to pay for HD content, they end-up using gray-area apps to accomplish the same thing. However, aside from the user-made free content on Youtube, there…

Read More
Best Cryptocurrencies to Invest in During Bearish Trends

Best Cryptocurrencies to Invest in During Bearish Trends

So, which cryptocurrencies would you invest in during bearish markets? Between bearish and bullish momentums, the cryptocurrency markets would tend to flip very frequently and this would leave investors totally…

Read More
The Common Factors in Phishing

The Common Factors in Phishing

Nowadays, the Internet plays a significant role in online commerce and business activities. However, the weak security awareness of users on the Internet and, a strong motivation for profit attracts…

Read More
Google’s Vulnerability Scanning for Their Cloud Infrastructure in Beta

Google’s Vulnerability Scanning for Their Cloud Infrastructure in Beta

Google is engaging in a very competitive market in cloud storage and solutions sector. It is a growth market where the search giant is wrestling arms with Amazon Cloud Services,…

Read More
Hackers in the Age of Bounty Programs

Hackers in the Age of Bounty Programs

The popular culture has depicted hackers as evildoers in movies, in TV series and even in the primetime news. However, the commodification of technology-enabled our modern environment of patch-cycles and…

Read More

Page 48 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register