Women’s Day Special Women in Cybersecurity 1

Women’s Day Special: Women in Cybersecurity

“Women in Cybersecurity”- a really interesting and relevant topic to discuss- not only on Women’s Day but perhaps on any other day. Let’s begin the discussion on a rather positive…

Read More
security breach

NSA Releases Ghidra The Cybersecurity Reverse Engineering Toolkit

In a surprise move at the RSA security convention, the National Security Agency announced the release of Ghidra, a free open source free software engineering toolkit. NSA has been using…

Read More
Open EDR
Alphabet Launches Cyber Security Product Called Backstory 1

Alphabet Launches Cyber Security Product Called Backstory

Alphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…

Read More
Beware Even Good Domains Also Carries Malicious URLs

Beware! Even Good Domains Also Carries Malicious URLs

According to an article on helpnetsecurity.com, it reads that nearly 40 percent of good domains carried malicious URLs. So now the question arises is legitimate websites compromised to host malicious…

Read More
Top 3 Cybersecurity Measures Skepticism Awareness and Training

Top 3 Cybersecurity Measures: Skepticism, Awareness and Training

What will you think of when you hear the word “information leak due to unauthorized access“? Why data breach incidents does not decrease? One of the reasons is the sophistication…

Read More
Instagram User Ways To Prevent From Falling For Account Theft

Instagram User? Ways To Prevent From Falling For Account Theft

Just like other social media platforms before it like Twitter and Facebook, Instagram (which is also a Facebook property) has experienced massive growth of its user base for the last…

Read More
What’s New With Separ Malware Family in 2019

What’s New With Separ Malware Family in 2024

Various anti-malware vendors are scrambling to fix their products in order to detect the new variant of Separ malware family. Separ is known as a password stealer virus, with its…

Read More
Facebook’s CSRF Vulnerability Allows Attackers To Hijack Accounts

Facebook’s CSRF Vulnerability Allows Attackers To Hijack Accounts

A fatal cross-site request forgery (CSRF) vulnerability on Facebook was discovered by a security researcher, and interestingly it allowed hackers to take over Facebook accounts with a simple one-click on…

Read More
NASA’s 35 Day Partial Shutdown A Step Towards Better Lives

NASA’s 35-Day Partial Shutdown A Step Towards Better Lives

The 35-day long U.S. Government shutdown has not only delayed basic government services and underfunded the operations of many state agencies and companies, but also caused a lot of missed…

Read More
Student Loans Company Hit by One Million Cyber Attacks in 2018 1

Student Loans Company Hit by One Million Cyber Attacks in 2023

Cybercriminals love to target institutions that either holds a lot of personal information or lots of money with weak security. Of course, the mainstream banks have a lot of money…

Read More

Page 9 of 28

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register