Cyber Attacks

Memory Forensics: The Key to Better Cybersecurity

The new pharmaceutical features will help companies to develop more direct relations with patients. On Tuesday, Salesforce launched new capabilities for its Health Cloud that target specific segments in the…

Read More
phishing scam

Many studies and investigations have been conducted into the number of stolen credentials on the dark web. Nonetheless, a new report recently issued is a little different: it relies on…

Read More
A Guide to Cyber Security Salary

About 2,000 websites in Georgia were compromised in a major cyber attack on Monday, including those of the President, courts and the press. The photograph of Georgia’s former exiled president…

Read More
Google Acknowledges Having Android Backdoor Triada

Consumer watchdog says Google gathers and uses location data without telling users. The Australian Competition & Consumer Commission (ACCC) is bringing up against Google and its Australian branch claims of…

Read More
After hacking, data theft, European Central Bank closes its website

A Texas man found guilty of hacking and abusing the LASC network for sending phishing emails was sentenced to a federal prison this week. The man, Oriyomi Sadiq Aloba, 33,…

Read More
Bulgarian IT Expert Arrested For Revealing Vulnerability in Software

Microsoft released a new series of security patches in Internet Explorer for a zero-day bug, originally addressed on September 23. The original updates introduced some printing problems, but the new…

Read More
Macro-Based Malware That Replaces Desktop Shortcuts to Install Backdoor

Attackings of technology businesses in Southeast Asia by a suspected Chinese threat actor employ a version of the open-source PcShare backdoor, safety scientists in BlackBerry Cylance warn. The attackers also…

Read More
Advanced Persistent Threat What You Need to Know

Today, criminal organizations no longer attack corporations and businesses physically with weapons. Instead, they use computers and malware, aiming to steal vital information that can be used for malicious means….

Read More
Adwind Spyware-as - a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic grid infrastructure that spoofs a PDF attachment to deliver Adwind spyware….

Read More
Common Social Engineering Attacks and How to Prevent Them

Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals or…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register