Blog

25 Results / Page 2 of 3

Background

todayDecember 18, 2020

  • 7
close

Cyber security + Ransomware 7 Defence

The Reign Of Egregor Ransomware

As the internet has made our life convenient and making us believe that we can trust them, are we actually safe while browsing the internet? Well, some people will agree & some will be contradicting but the question will still remain in doubt. Well, today I’m going to narrate about ...

todayDecember 12, 2020

  • 6
close

Cyber security 7 Defence

CYBER SECURITY IN THIS ERA

Cyber Security is best described as the collective methods, technologies and processes to help protect the confidentiality, integrity and availability of computer systems, networks and data against cyber-attacks or unauthorized access. In this era, the digital era, the importance of data security nowadays is as crucial as the amount, content ...

todayOctober 2, 2020

  • 29
close

Cybercrime + Global news 7 Defence

ALERT!! New Android Spyware found Posing As Telegram And Threema App

A hacking group which was notorious in 2017, has recently been found impersonating legitimate messaging apps such as Telegram and Threema to infect Android devices with a new malware. “Compared to the versions documented in 2017, Android/SpyC23.A has extended spying functionality, including reading notifications from messaging apps, call recording and ...

todaySeptember 28, 2020

  • 242
  • 1
  • 198
close

Global news + Ransomware 7 Defence

OldGremlin Ransomware Group GROUP HITS RUSSIAN COMPANIES

The cybercriminal group has plagued firms with ransomware that were sent via spear phishing emails with COVID-19 lures, since March. A new cybercriminal group called OldGremlin has been targeting Russian companies – including banks, industrial enterprises and medical firms with ransomware attacks. OldGremlin relies on a group of tools, including ...

todaySeptember 28, 2020

  • 160
  • 3
  • 195
close

Cyber security + Global news 7 Defence

An Instagram app Bug that Could’ve Given Hackers Remote Access to Your Phone

According to the report, Check Point researchers disclosed details about a critical vulnerability in Instagram’s Android app that could have allowed remote attackers to take control over a targeted device just by sending victims a specially crafted image. The most worrisome thing about this flaw is that it not only lets attackers ...

todaySeptember 26, 2020

  • 97
  • 5
  • 141
close

Cyber security + Global news 7 Defence

FinSpy spyware tragets egypt

Amnesty International today exposed details of a new surveillance campaign that targeted Egyptian civil society organizations with previously undisclosed versions of FinSpy spyware designed to target Linux and macOS systems. Developed by a German company, FinSpy is extremely powerful spying software that is being sold as a legal law enforcement tool ...

todaySeptember 25, 2020

  • 122
  • 2
  • 95
close

Cyber security + Cybercrime + Global news 7 Defence

Microsoft Windows XP Source Code Leaked Online

Microsoft’s long-lived operating system Windows XP—that still powers over 1% of all laptops and desktop computers worldwide—has had its source code leaked online, allegedly, along with Windows Server 2003. The source code for Microsoft’s 19-year-old operating system was published as a torrent file on notorious bulletin board website 4chan, and ...

todaySeptember 25, 2020

  • 119
  • 2
  • 103
close

Cyber security + Global news 7 Defence

Fortinet VPN Default Configuration Allows MITM Attacks

Default configurations of Fortinet’s FortiGate VPN appliance could open organizations to man-in-the-middle (MitM) attacks, according to researchers, where threat actors could intercept important data. According to the SAM IoT Security Lab, the FortiGate SSL-VPN client only verifies that the certificate used for client authentication was issued by Fortinet or another ...