The U.S. Department of Homeland Security (DHS) has announced the discovery of an intensified cyberattack by hackers against Enterprise Resource Planning (ERP) systems, the integrated management of core business processes,…
Read MoreThe U.S. Department of Homeland Security (DHS) has announced the discovery of an intensified cyberattack by hackers against Enterprise Resource Planning (ERP) systems, the integrated management of core business processes,…
Read MoreThe Internet of Things (IoT) has slowly but surely taken the internet by storm, essentially turning many household objects into “smart” devices. Without a doubt, this phenomenon is following the…
Read MoreAs the world recovers from the WannaCry ransomware epidemic of 2017, the Server Message Block version 1 protocol has received a lot of press for being a highly-exploitable attack surface….
Read MoreRansomware seems to have taken a back seat and not it’s Cryptojacking the latest arsenal for cybercriminals, and it has increased drastically over the year. It looks like the priorities of…
Read MoreThe non-state/non-government supported cryptocurrencies have penetrated the global economy in a big way for the last 5 years. The growth of its influence is fairly evident, as at least 1,600…
Read More“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…
Read MoreSecurity researchers recently discovered a group of cybercriminals successfully spreading Trojan banking malware through the use of bogus Google Play applications. First detected in June by professionals at IBM X-Force, the…
Read MoreThe start-up crypto exchange, Bancor, has officially confirmed a recent security breach resulting in the loss of $12.5 million worth of Ether and $1 million worth of Pundi X. When bitcoin…
Read MoreRemember last year, Verizon released data breach investigation report that showed 80 percent of the hacking was related to stolen password. The cybercriminals used the victim’s password to gain access to their…
Read MoreIndustry research supports the belief that cybercriminals are currently developing many new ways to boost their attack capabilities, on the network and beyond. Drawing conclusions from the collective intelligence of…
Read More