SandCat And FruityArmor Campaigns Took Advantage Of Zero-Day Flow
Critical vulnerability under CVE-2019-0797 has been recently patched by Microsoft in order to lessen the chances of two Advanced Persistent Threat groups, SandCat, and FruityArmor from taking advantage of it. The former zero-day exploit was being exploited by the two groups extensively, with many of their victims unaware of it. This is given since only
[ Read More ]Microsoft To Roll Back Updates Which Cause Failed Boot
When Windows 10 was first introduced in 2015, the roll-out was not smooth sailing, but instead became a center of controversy for an operating system released by Redmond. It was accused of being an information collection tool for Microsoft, forced obsolescence of older version of Windows since DirectX 12 API is a Windows 10 exclusive
[ Read More ]Australia VS Huawei Devices Storyline Never Die
The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to
[ Read More ]Streaming Music Service Competition To Intensify In India
Streaming services market is already saturated in western countries like the United States and the United Kingdom, the rest of North America and Europe. The only way for services such as Spotify and Youtube Music to expand is by entering new markets, especially in areas of emerging nations. That could be China, if not due
[ Read More ]Google Service Downtime? Check Google Service Status Portal
Google services has become very influential for two decades now, to a point that the world is heavily depending on it for everyday stuff. Services like email, videos, messaging, authentication across many web services and etc are highly dependent on Google working as it should. We can safely say that a downtime of a Google
[ Read More ]Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool
There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this
[ Read More ]The Cybersecurity Risks Of Engaging With Cryptocurrency
Cryptocurrency and the rise crypto-economy have become all the rage in the last 5 years, especially those speculators that are in it for one-time, big-time possibilities. People who even lack enough knowledge about the technology jumped into the bandwagon, and the .com bubble of the late 90s and early 2000s made a repeat. Cryptocurrency exchanges
[ Read More ]Malware In ThePirateBay? A Surprise Or Nothing New?
ThePirateBay has been existing for at least two decades now, migrating from one domain extension to the next during its history since September 2003. Marketed itself as an online index of all media, regardless of their copyright protection, the site grew to 35 languages through the years. It is considered the biggest content hosting site,
[ Read More ]CISO’s Role For Cybersecurity Readiness, Highlighted By Cisco
We are in the paradigm shift when the majority of companies, slowly but surely embracing cloud computing and cloud apps platforms. Cisco’s CISO Benchmark Study 2019 is a global survey participated and represented by 18 countries with 3,200 participants, majority of whom are leaders in the IT field, across many industries from SMEs to multinational
[ Read More ]Restaurants & Food Businesses, New Hacking Targets?
Restaurants, food, and beverage companies are not usual targets of cyber attacks, malware infection, ransomware infestation, and data breach attempts. However, a paradigm shift is currently happening, when threat actors are looking for new victims, new industries to focus on when it comes to their campaigns. The key ingredient of becoming an attractive potential victim
[ Read More ]