Malware vs Corporate Data

Malware vs Corporate Data, An Overview

At the backdrop of the recent PGA Championship season, ransomware had a very surprising role play, to infect the computers used by the PGA for running the tournament. If such…

Read More
The Most Dangerous Malware of 2018

The Most Dangerous Malware of 2024

As reported in the Becker Hospital Review. Around 91 of the 229 data breaches submitted to HHS’ Office for Civil Rights’ breach portal this year are recorded as hacking or…

Read More
Open EDR
Anti-Malware Apps Found Stealing Browser Data Removed By Apple

Anti-Malware Apps Found Stealing Browser Data Removed By Apple

Apps from a well-known cyber-security firm were brought down from the Mac app store by Apple after they were found to send out users’ browser histories. Many anti-malware applications made…

Read More
4 Reasons Ransomware Attacks Should Be Duly Reported

Attackers Revamp Old Ransomware for Cryptocurrency Malware

In another tale of malware types, cybercriminals are starting to repurpose old ransomware with new capacities to illegally mine or steal cryptocurrencies like Bitcoin and Monero. Cybersecurity firms Fortinet and…

Read More
The Gulf Countries Especially Qatar in the Age of Cyberattacks

The Gulf Countries, Especially Qatar in the Age of Cyberattacks

Cyberthreats are happening even in the Gulf countries, especially in the isolated state of Qatar. A few months ago, other countries in the Gulf have severed ties with Qatar, but…

Read More
Cheap Nasty FormBook Malware Used for Data Stealing Campaign

A New Malware for Bitcoin ATMs on sale for $25,000

IT security firm Trend Micro has discovered Bitcoin ATM malware at a bargain for $25,000 on the dark web, and what seems like another criminal pattern far from the physical ATM attack to…

Read More
CamuBot Banking Trojan Targeting Brazilian Bank Customers

CamuBot Banking Trojan Targeting Brazilian Bank Customers

Brazilian banks and their respective clients need to be alert of a new malware named, as it pretends to be a login security check during a bank login procedure if…

Read More
How to Protect a Company from Ransomware Attacks

Malware Uses Cryptojacking, Cryptomining With Ransomware

Ransomware has been a major headache over the recent years. Cybercriminals are currently re-looking at this malware family to concentrate on cryptomining and cryptojacking. Cryptocurrencies are still attracting criminals, regardless of the falling value, thus…

Read More
How Enterprises Can Combat Cybersecurity Challenges On The Cloud

How Enterprises Can Combat Cybersecurity Challenges On The Cloud

This is the age of cloud technology; we depend a lot on the cloud, for computing, for storage, for data analytics, and much more. Enterprises seek to make the most…

Read More
The 5 Key Steps to Avoid Malware

The 5-Key Steps to Avoid Malware 

The virtual world, where people live online is marred by privacy violation, and how we hear the stories of scams and hacking almost every day. These kinds of issues are…

Read More

Page 12 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register