Cyber Crime

Macro Based Malware That Replaces Desktop Shortcuts to Install Backdoor

Cylance Security Researchers Warn Technology Firms in Southeast Asia for Chinese Open –Source Backdoor

Attackings of technology businesses in Southeast Asia by a suspected Chinese threat actor employ a version of the open-source PcShare backdoor, safety scientists in BlackBerry Cylance warn. The attackers also…

Read More
Benefits and Best Practices of Adaptive Security

Benefits and Best Practices of Adaptive Security

The DevOps environment has been changing rapidly, and adaptive security has become a widely used response to this. The main purpose of adaptive security is to create layers of security…

Read More
Memory Forensics The Key to Better Cybersecurity

Memory Forensics: The Key to Better Cybersecurity

When companies fall victim to a cyberattack, the first thing they do is eliminate the threat. But for cybersecurity investigators, that’s just the first part of their job. Like real-world…

Read More
Open EDR
What Is an Intrusion Prevention System

What Is an Intrusion Prevention System?

When you need a tool to find and detect malicious activity within a network, an intrusion prevention system (IPS) fills that role. They first detect any malicious activities in the…

Read More
A Guide to Cyber Security Salary

A Guide to Cyber Security Salary

In 2020, it is expected that the cyber security market will be around $170 billion. The Burning Glass Technologies Research provides data from 2015, which shows that the cyber security…

Read More
KNOB Security Flaw Exploits All Versions Of Bluetooth Devices

“KNOB” Security Flaw Exploits All Versions Of Bluetooth Devices

There are times when technology becomes too ubiquitous and too accessible by the public for its own good, it becomes a favorite target of cybercriminals. Discovery of vulnerability by security…

Read More
API Security Developers And Users Responsibility

API Security, Developers And Users Responsibility

The world of software development today is flooded by APIs (Application Programming Interface). We can think of whatever web service provider today, and surely that vendor offers APIs for their…

Read More
5 Informative Security Podcasts to Listen To

5 Informative Security Podcasts to Listen To

Cyber security is a complex area of security. With technology evolving faster and faster every year, new methods of cyber attacks are being invented, and new cyber security methods are…

Read More
Desktop App Security Should Be Treated The Same As Cloud Apps

Desktop App Security Should Be Treated The Same As Cloud Apps

As more traditional desktop applications are gaining Internet-interface or even the same software available in the cloud, how to treat it should no longer be different with cloud apps. Below…

Read More
Review of Cybersecurity Measures For Customers and Vendors

Review of Cybersecurity Measures For Customers and Vendors

Cybersecurity measures can only be tested in two ways, the first one is something nobody wants to happen: to be tested for real, by a real cyber attack. The second…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register