Ryuk Ransomware Variant Blacklists IP Addresses Computers

Ryuk Ransomware Variant Blacklists IP Addresses, Computers

A new variant of the Ryuk ransomware, which blacklists IP addresses and computers and thus simplifies the infection process, has been detected. MalwareHunterTeam had discovered this new sample which adds…

Read More
How Safe Is Your Endpoint From Cyber Attack

How Safe Is Your Endpoint From Cyber Attack

In the current business environment, any device that can connect to a network is termed as “endpoint” from desktops, laptops, tablets, smartphones and, more recently, IoT devices. As devices evolve,…

Read More
Open EDR
EU’s Embassy In Moscow Was Hacked

The EU’s Embassy In Moscow Was Hacked and Kept It Secret

A “sophisticated cyber espionage event” began in February 2017. Russian entities are said to be behind piracy, a source told BuzzFeed News. The European Union embassy in Moscow was compromised…

Read More
Do You Know When The First Cyber Attack Took Place Read On

Do You Know When The First Cyber Attack Took Place? Read On

WannaCry, a malicious computer virus that encrypts data and demands ransom, hit thousands of computers across the world, causing several organization to close down. Not a day goes by without…

Read More
enterprise email

Our Long Collective Struggle To Secure Enterprise Email

Email is the oldest service on the Internet, launched in the 1970’s, it is older than the WWW or the World Wide Web itself for more than three decades. However,…

Read More
The Fileless Malware Attacks Are Here To Stay 1

The Fileless Malware Attacks Are Here To Stay

The development methodology of malware has changed drastically, something that cannot be ignored. A few years ago, the primary objective of the hackers was to rake profit and avoid detection….

Read More
Bad Actors Still Raking Profit From Ransomware 1

Bad Actors Still Raking Profit From Ransomware

The most efficient malware used by cyber crooks is Ransomware. Affecting everyone and everything it continues to wreak havoc on a global scale, from regular Internet users to enterprises to…

Read More
How to Protect Yourself from Online Cyber Attacks at Work

How to Protect Yourself from Online Cyber Attacks at Work

Anyone who is on the internet is vulnerable to cyber attacks. Today, we depend on the internet for all kinds of things, including shopping, financial services and transactions, communication, entertainment…

Read More
Man in the Middle MITM Attacks 1

Man-in-the-Middle (MITM) Attacks: An Introduction

What is a Man-in-the-Middle (MITM) Attacks – Definition MITM attack refers to the kind of cyberattack in which an attacker eavesdrops on the communication between two targets- two legitimately communicating…

Read More
Malware Attack Shuts Down Columbia State Community College

Malware Attack Shuts Down Columbia State Community College

Five campuses of the Columbia State Community College were forced to shut down for two days following a malware attack. The issues reportedly happened after an employee opened an email…

Read More

Page 2 of 8

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register