Imagine if the exact computer you are using is “conscious” enough to determine that it is infected with malware on its own, without the use of antimalware software. That is…
Read MoreImagine if the exact computer you are using is “conscious” enough to determine that it is infected with malware on its own, without the use of antimalware software. That is…
Read MoreSpear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because…
Read MoreOn 6th July Canonical owned account on GitHub was hacked and credentials were compromised and used to create repositories and issues among other activities. Canonical removes the compromised GitHub account…
Read MoreThe information security analyst is an important role in any organization, since they keep sensitive information secure. They work with the different departments to find and correct any flaw with…
Read MoreA city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city of Florida has paid for ransomware in the past two weeks…
Read MoreA critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical flaw in the popular note-taking extension Evernote could…
Read MoreResearchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts with exposed APIs and use them for cryptocurrency…
Read MoreMalware authors continue to find ways to operate at a more sophisticated level, especially Advanced Persistent Threats (APT). Known as ScarCruft team, as exposed by Kaspersky Lab for establishing espionage…
Read MoreSome key online operations in the U.S city of Baltimore have been impacted following a ransomware attack. Reports reveal that all online payment gateways and emails have been totally affected,…
Read MoreHackers are actively exploiting recent patched remote code execution vulnerabilities in the Microsoft SharePoint Servers version to inject the China Chopper web shell, which allows hackers to inject various commands….
Read More