The U.S. Department of Homeland Security (DHS) has announced the discovery of an intensified cyberattack by hackers against Enterprise Resource Planning (ERP) systems, the integrated management of core business processes,…
Read More
The U.S. Department of Homeland Security (DHS) has announced the discovery of an intensified cyberattack by hackers against Enterprise Resource Planning (ERP) systems, the integrated management of core business processes,…
Read More
The Internet of Things (IoT) has slowly but surely taken the internet by storm, essentially turning many household objects into “smart” devices. Without a doubt, this phenomenon is following the…
Read More

As the world recovers from the WannaCry ransomware epidemic of 2017, the Server Message Block version 1 protocol has received a lot of press for being a highly-exploitable attack surface….
Read More
Ransomware seems to have taken a back seat and not it’s Cryptojacking the latest arsenal for cybercriminals, and it has increased drastically over the year. It looks like the priorities of…
Read More
The non-state/non-government supported cryptocurrencies have penetrated the global economy in a big way for the last 5 years. The growth of its influence is fairly evident, as at least 1,600…
Read More
“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…
Read More
Security researchers recently discovered a group of cybercriminals successfully spreading Trojan banking malware through the use of bogus Google Play applications. First detected in June by professionals at IBM X-Force, the…
Read More
The start-up crypto exchange, Bancor, has officially confirmed a recent security breach resulting in the loss of $12.5 million worth of Ether and $1 million worth of Pundi X. When bitcoin…
Read More
Remember last year, Verizon released data breach investigation report that showed 80 percent of the hacking was related to stolen password. The cybercriminals used the victim’s password to gain access to their…
Read More
Industry research supports the belief that cybercriminals are currently developing many new ways to boost their attack capabilities, on the network and beyond. Drawing conclusions from the collective intelligence of…
Read More