Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities
Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks.
The researchers noted a shortening of the period between the disclosure of a vulnerability...
Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools
There is evidence found pointing to the connection between FIN7 (aka Carbanak), a financially motivated hacking group, and the Black Basta ransomware gang.
The cybersecurity researchers at Sentinel Lab conducted an analysis in which they...
What You Need To Know About IP Address Management Systems
By 2023, the number of gadgets connected to IP networks will be three times more than the global population, according to statistics on Cisco. With more devices added to networks, managing internal IP networks...
What is Access Control and its Importance in Cyber Security?
Are you wondering what access control is? Then here, you will get the answer. This is the security technique that minimizes the risk of the organization in a computing environment. Access control can work...
D-Link Critical Flaw Let Attackers Execute Arbitrary Code And Obtain Sensitive Information
Cisco Talos, the threat intelligence research team of Cisco has recently identified and uncovered several critical security flaws in the router of D-LINK, DIR-3040, it's an AC3000-based wireless internet router.
By exploiting the detected bugs,...
10 Different Types of Dangerous Malware Attack and How to Avoid them
Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit computers or computer systems.
Thus we can say that it is a...
What is WarXing in Cyber Security? What are the Benefits?
You might have heard about WarXing; here you will get detailed information about that. WarXing is always searching for Wi-Fi networks because in this hyper-connected world users need to need a stable internet connection....
System Admin of FIN7 Hacking Group Sentenced to Ten Years in Prison
Fedir Hladyr, 35, a Ukrainian national, served as a high-level manager and systems administrator for FIN7. He was arrested in Dresden, Germany, in 2018 at the request of U.S. law enforcement and was extradited...
100 Million+ Devices Affected With Critical WRECK DNS Implementation Flaws
JSOF team together with Forescout Research Labs, have revealed a set of nine vulnerabilities related to Domain Name System (DNS) implementations, causing either Denial of Service (DoS) or Remote Code Execution (RCE).
This vulnerability set,...
Data Encryption: Why Is It So Important?
No one would have imagined a few years ago that cybercrime would become such a big concern as it is today. Billions of attacks are launched against individual devices and entire company networks each...