Home Search
malicious attacker - search results
If you're not happy with the results, please do another search
Largest HTTPS DDOS Attack Recorded By Google with 46 Million Requests Per Second
It was reported that Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one...
Apple Released Emergency Security Updates to Fix Two Zero-Day Flaw Actively Exploited
There have been two zero-day vulnerabilities previously exploited by hackers in order to gain access to several Apple devices:-
iPhonesiPadsMacs
However, both of these issues have...
MailChimp Security Breach Exposed the Email Addresses of DigitalOcean Customers
An American Cloud Infrastructure Provider, DigitalOcean, customers were impacted by a recent security incident disclosed by an Email Marketing company, Mailchimp. The security breach...
SOVA Android Banking Malware Adds Ransomware Feature to Encrypt Files
The Android banking Trojan SOVA (“Owl” in Russian) was under active development since September 2021. Reports say multiple versions of SOVA were found in...
Chinese Hackers Backdoor Chat App to Steal Data From Windows, Linux & macOS
The cybersecurity researchers at SEKOIA have recently identified a trojanized version of MiMi, which is primarily aimed at the Chinese market but is also...
4 Best Features of a Secure Web Gateway To Combat Online Threats – Free...
There are over 3.4 billion phishing emails sent out per day. It takes only one wrong click and you could be the subject of...
How to improve cybersecurity skills
Despite advanced information security technology, the human element still plays a major role in reducing the risk of cyberattacks. You can search for java...
Evilnum APT Hackers Group Attack Windows Using Weaponized Word Documents
Researchers from ThreatLabz uncovered Evilnum, an APT threat actor, is once again up to its old tricks targeting European financial and investment institutions, with some...
Zero Trust: Intelligent Security Approach To Adapting The Future of Remote Work
Zero Trust has become the main buzzword throughout the IT and cybersecurity world today due to the rise of remote work in modern businesses....
Are You Aware of the Top Email Threats to Protect Against Today?
Given the growing volumes of emails received every day, people do not have the time to devote to every email and fall prey to...