Cyber Security

Threat Intelligence Automation

Cyber Threat Intelligence (CTI) is a framework and technology that generates intelligence that can, or will respond to cyber threat attacks that are now...

Twitter Hack Meltdown: phishing is the culprit

The Twitter hack meltdown that happened a few week ago which has made the news everywhere and involved the profiles of celebrities and politicians...

Dell PowerEdge Server, trouble on the horizion?

Crisis averted for Dell PowerEdge servers, after a group of researchers disclosed details of a recently patched, high-severity flaw, which if exploited could allow...

VPN users beware, this flaw could compromise your entire infrastructure

VPN have been one of the "stars" of this pandemic era. Office workers and companies alike relied upon it so much that it has...

OWASP – Open Web Application Security Project

The Open Web Application Security Project (OWASP) has compiled a list of the 10 largest web security vulnerabilities in the world's most popular web...

Emotet is back, but how do we know if we are being targeted?

After a break of five months Emotet is back with a vengeance with a new and massive malspam campaign - detected on the 17th...

Why Companies Should Care More About Credential Breach?

Phishing attacks and stolen credentials are becoming more common in the world of data security, and employee errors are helping to pave the way,...

Fake Sharepoint messages, Office 365 credentials at risk

There's no stopping Phishers as it seems right now. Threat actors are now beginning to leverage fake automated messages from Sharepoint, Microsoft's own collaborative...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

Pareto botnet claims jailbroken devices are TVs

Experts from Human Security (formerly White Ops) have discovered the Pareto botnet that infects Android devices and uses them to scam...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Lucky Bait, Microsoft still phishers favorite

According to Check Point, Microsoft is top dog when...

Hundreds of CEOs’ email access is up for sale

The closed Russian-language cybercriminal forum Exploit.in sells access to...