Microsoft Hesitates About Machine Learning Can Also Be Used By Hackers

Microsoft Hesitates About Machine Learning, Can Also Be Used By Hackers

Imagine if the exact computer you are using is “conscious” enough to determine that it is infected with malware on its own, without the use of antimalware software. That is…

Read More
Spear Phishing How to Protect Yourself From an Attack

Spear-Phishing: How to Protect Yourself From an Attack

Spear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because…

Read More
Open EDR
GitHub Account of Canonical Hacked PII Source Code Safe

GitHub Account of Canonical Hacked, PII Source Code Safe

On 6th July Canonical owned account on GitHub was hacked and credentials were compromised and used to create repositories and issues among other activities. Canonical removes the compromised GitHub account…

Read More
Definition and Importance of an Information Security Analyst

Definition and Importance of an Information Security Analyst

The information security analyst is an important role in any organization, since they keep sensitive information secure. They work with the different departments to find and correct any flaw with…

Read More
Second US City Pays Hackers For Ransomware

Second US City Pays Hackers For Ransomware

A city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city of Florida has paid for ransomware in the past two weeks…

Read More
Evernote Critical Flaw Could Have Impacted Millions of Users

Evernote Critical Flaw Could Have Impacted Millions of Users

A critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical flaw in the popular note-taking extension Evernote could…

Read More
Compromised Docker Hosts Use Shodan for Cryptocurrency Mining 1

Compromised Docker Hosts Use Shodan for Cryptocurrency Mining

Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts with exposed APIs and use them for cryptocurrency…

Read More
ScarCruft An Anti North Korean Hacking Team 1

ScarCruft, An Anti-North Korean Hacking Team

Malware authors continue to find ways to operate at a more sophisticated level, especially Advanced Persistent Threats (APT). Known as ScarCruft team, as exposed by Kaspersky Lab for establishing espionage…

Read More
Ransomware Attack Impacts Baltimore Emails Online Payments 1

Ransomware Attack Impacts Baltimore Emails, Online Payments

Some key online operations in the U.S city of Baltimore have been impacted following a ransomware attack. Reports reveal that all online payment gateways and emails have been totally affected,…

Read More
Microsoft SharePoint Servers Actively Targeted By Hackers 1

Microsoft SharePoint Servers Actively Targeted By Hackers

Hackers are actively exploiting recent patched remote code execution vulnerabilities in the Microsoft SharePoint Servers version to inject the China Chopper web shell, which allows hackers to inject various commands….

Read More

Page 1 of 11

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register