Leaks

Understanding What Is Malware Analysis

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has uncovered a new social engineering scheme in which the hackers…

Read More
36TB Data Breach The Culprit Lenovo’s Obsolete Iomega NAS

Over 1 Billion Individual Data Leaked Due to Alleged Chinese Police Database Hacking

In a leak that, if verified, could be one of the biggest data breaches in history, hackers might have obtained a wealth of information belonging to over I billion Chinese…

Read More
comodo partner
Understanding What Is Malware Analysis

This New Malware Is Now a Favorite among Ransomware Gangs

According to cybersecurity researchers, the bumblebee loader is now a darling in the ransomware ecosystem.  A new malware is now an important component when it comes to engineering ransomware attacks….

Read More
technology drone

The Great Resignation in the Tech Sector and Tips to Solve the Issue

Human resource managers are finding it hard to close the growing skills disparities in their companies. For many, the issue is that the conventional method of addressing skills shortages has…

Read More
LibreOffice OpenOffice Remote Code Execution Vulnerability Biting Casual Users

Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Citrix announced on Tuesday that Citrix Application Delivery Management (ADM) has a serious vulnerability that might allow an unauthorized attacker to enter as administrator. Citrix ADM is a centralized management…

Read More
What Is Application Control — Types and Benefits

Owl Labs Patches Awful Exposure in Video Conferencing Applications

Owl Labs, an organization that deals in video conferencing, has announced severe exposure to its devices, including the Whiteboard Owl and Meeting Owl Pro. These two softwares allow people to…

Read More
Bad Actors Still Raking Profit From Ransomware 1

A Ransomware Group Claims to Have Breached the Foxconn Factory

Malicious hackers claim to have hacked into the network system of the Foxconn Baja factory in Mexico on June 11. using the LockBit 2.0 ransomware to conduct the cyber-attack, the…

Read More
Quick Guide on How to Fix Chrome’s ‘ERR SSL PROTOCOL ERROR’

Chrome 102 Patches 32 Vulnerabilities

Google is preparing to promote Chrome 102 to take its place after releasing Chrome 101 just over a month ago. The new Chrome release is chock-full of developer-oriented features, which…

Read More
A DoS Flaw That Could Help Take Down WordPress Websites

Large-Scale Attack Targeting Tatsu Builder WordPress Plugin

Hackers are reportedly targeting WordPress sites that use an unknown security version of the Tatsu no-code website builder plugin. As part of a massive attack attacking a vulnerability in the…

Read More
The Feasibility Of Tape Backup Against Ransomware

Microsoft: The Ransomware ware is Changing, Here’s What You Need to Know

Microsoft has highlighted RaaS, also known as ransomware as a service, as a criminal company relying on freelancers and is designed to spread the risk.   Microsoft security professionals track over…

Read More

Page 1 of 8

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password

Register