Vendor SOC 1, 2 or 3 – Understanding the Differences

Vendor SOC 1, 2 or 3 – Understanding the Differences

Your vendors pose different types of risks to your business and organization. Make sure they comply with industry standards. Deal with a SOC-compliant vendor if you use its services for critical projects. The three...
King Of Malware “Emotet” Launching Aggressive Attack Via XLS Doc & New Payloads

King Of Malware “Emotet” Launching Aggressive Attack Via XLS Doc & New Payloads

Emotet, An infamous banking trojan-based malware family with a sophisticated attack background, returns with a new attack strain via XLS documents using targeted phishing emails and delivers the new IcedID and Bumblebee payloads. Emotet built...
Why Website Captchas are Vulnerable to Cyber-Attacks?

Why Website Captchas are Vulnerable to Cyber-Attacks?

CAPTCHA and reCAPTCHA are common on all websites that require user interaction and completion of online forms. Although they were a bit annoying in the beginning, as the technology driving CAPTCHAs evolved to the...
AirAsia Hacked – 5 Million Passengers’ and Employees’ Data Stolen

AirAsia Hacked – 5 Million Passengers’ and Employees’ Data Stolen

Daixin Team launched a ransomware attack against AirAsia Group. The incident happened earlier this month over the course of two days, resulting in the leak of personal information pertaining to 5 million unique passengers...
U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Cyber security infrastructure and security Agency uncovered a potential cyber attack on the U.S Federal network where attackers compromised the organization’s DC and possibly deployed crypto Miner, credential Harvester. Iranian APT hackers launched an...
Billbug

Billbug – APT Hackers Group Attack Digital Cert Authority to Intercept The HTTPS...

Researchers uncovered that State-Sponsors APT hackers called "Billbug" attacked and compromise the digital certificate authority in multiple Asian countries along with other government and defense agencies. An ongoing campaign attributed to the infamous APT group...
Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Researchers uncovered an infamous and widely distributed malware Emotet, now targeting Windows users by employing a malicious Excel File after six months after its last activity. Emotet is considered a kind of malware family among the...
How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

People who use a PC always fear that someone might be looking at all their activities for stealing thier password, reading their messages and more. But these are not just false fears it is...
Malicious Android Apps

Android Apps With Millions of Installation Redirect Users to Weaponized Websites

It seems that the Google app store has still not been able to catch malicious applications, as they are still being listed there. In the Google Play store, there are currently four malicious apps...
OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

There have been two high-severity security vulnerabilities recently discovered and patched by the OpenSSL Project in its open-source cryptographic library.  Encryption of communication channels and HTTPS connections is achieved through the use of this cryptographic...
Website