Browsing tag

Cyber Security

Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users

The U.S. multinational computer software company Adobe has suffered a serious security breach earlier this month that exposed user records’ database belonging to the company’s popular Creative Cloud service. With an estimated 15 million subscribers, Adobe Creative Cloud or Adobe CC is a subscription service that gives users access to the company’s full suite of […]

How to Avoid the Top Three Causes of Data Breaches in 2019

What’s the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we’ll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a timely manner. Misconfigured Cloud Storage It’s hard to find […]

Avast hacked after attackers gained domain admin privileges

Just today, the cyber security giant Avast revealed in a blog post that they were hacked in May earlier this year in an attempt they have termed as “Abiss.” Leveraging on the compromised VPN profile of an employee that did not require 2FA, the intruder was able to gain domain admin privileges through privilege escalation […]

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people. Extortion by email is growing significantly, with a large number of users recently complaining about receiving sextortion emails […]

Authorities use hackers to find missing persons

Australia Holds World’s First Hackathon to Find Missing Persons. Whether hacking can be ethical or not, it is still a debatable point but law enforcement agencies in Australia have come up with an interesting new way to utilize hackers’ skills for societal welfare. Reportedly, Australian Federal Police took 354 hackers and investigators from all over […]

Ransomware Attack – Everything You Need to Know Ransomware Protection

Ransomware attack is quite common nowadays since Malicious software spreading everywhere through various mediums. The cybercriminals that use it are looking to do one thing, extort your money. Not unlike the movies, it usually starts with an ominous ransom note demanding money. This usually appears in the form of a notification that pops up on […]

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

Until now, I’m sure you all might have heard of the SimJacker vulnerability disclosed exactly a month ago that affects a wide range of SIM cards and can remotely be exploited to hack into any mobile phone just by sending a specially crafted binary SMS. If you are unaware, the name “SimJacker” has been given […]

vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities

After releasing a patch for a critical zero-day remote code execution vulnerability late last month, vBulletin has recently published a new security patch update that addresses 3 more high-severity vulnerabilities in its forum software. If left unpatched, the reported security vulnerabilities, which affect vBulletin 5.5.4 and prior versions, could eventually allow remote attackers to take […]

Comodo Forums Hack Exposes 245,000 Users’ Data — Recent vBulletin 0-day Used

If you have an account with the Comodo discussion board and support forums, also known as ITarian Forum, you should change your password immediately. Cybersecurity company Comodo has become one of the major victims of a recently disclosed vBulletin 0-day vulnerability, exposing login account information of over nearly 245,000 users registered with the Comodo Forums […]

Microsoft Warns of a New Rare Fileless Malware Hijacking Windows Computers

Watch out Windows users! There’s a new strain of malware making rounds on the Internet that has already infected thousands of computers worldwide and most likely, your antivirus program would not be able to detect it. Why? That’s because, first, it’s an advanced fileless malware and second, it leverages only legitimate built-in system utilities and […]

DoorDash Breach Exposes 4.9 Million Users’ Personal Data

Do you use DoorDash frequently to order your food online? If yes, you are highly recommended to change your account password right now immediately. DoorDash—the popular on-demand food-delivery service—today confirmed a massive data breach that affects almost 5 million people using its platform, including its customers, delivery workers, and merchants as well. DoorDash is a […]

Outlook for Web Bans 38 More File Extensions in Email Attachments

Malware or computer virus can infect your computer in several different ways, but one of the most common methods of its delivery is through malicious file attachments over emails that execute the malware when you open them. Therefore, to protect its users from malicious scripts and executable, Microsoft is planning to blacklist 38 additional file […]

Information Security Professional Degeneration

00:35 Ministry of Sound, London, UK – We all know what professional development is; I am going to talk about going to the opposite: professional degeneration. If you ask mid-and-advanced-career information security professionals about their jobs in information security, most of them may not express the kindest sentiments. That might be a gross understatement – […]

NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs

Unlike previous side-channel vulnerabilities disclosed in Intel CPUs, researchers have discovered a new flaw that can be exploited remotely over the network without requiring an attacker to have physical access or any malware installed on a targeted computer. Dubbed NetCAT, short for Network Cache ATtack, the new network-based side-channel vulnerability could allow a remote attacker […]

CISO Kit — Breach Protection in the Palm of Your Hand

CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with every changing detail. Finding the right balance that enables them to clearly grasp the big picture required in making sound decisions is a task many security executives find challenging. Threat actors […]

7 Essential Features of a Perfect Privileged Access Management Solution

Privileged accounts have access to the most valuable corporate information, which is why they are often targeted by attackers. As a result, organizations face the need to manage privileged access in a secure and effective manner. Many compliance regulations have strong security control recommendations for privileged user management. To meet these requirements and prevent devastating […]