Attacks

How Countries can Up Their Cybersecurity Game?

While it is generally the incidents in the US and Europe that tend to get the maximum exposure, cyber-attacks are occurring with increasing frequency in all parts of the world. From the use of ransomware to increasing numbers of data breaches, India is no exception. This is why the need to increase protection from these, and other

[ Read More ]

An Insight to Remote Working & Cybersecurity Amidst a Pandemic

The COVID-19 has disrupted businesses at a large scale, and companies all across the globe are working with fully remote workforces. A new report found that the sudden switch to work-from-home resulted in quick and even hasty deployment of cloud services in some cases. This led to overlooking various things in the security configuration, leaving companies susceptible to

[ Read More ]

Common Ways For Countering Privileged Identity Theft Attacks

Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are

[ Read More ]

Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare

The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]

Twitter Vulnerability that Allows to Tweet on Other People’s Behalf

After various social network hack, particularly with regards to Facebook, many have started giving careful consideration to the security of the social media account. Along these lines, a British security analyst as of late, figured out a genuine flaw on Twitter. Richard De Vere is an ethical hacker and security researcher, who reported about, the Twitter

[ Read More ]