Browsing tag

cybersecurity

“Denial-of-Service Condition” Impacts US Energy Company

A “denial-of-service condition” has reportedly impacted a US energy company that provides power to many western states. TechCrunch reports, “An energy company providing power in several western U.S. states experienced a “denial-of-service condition” serious enough to warrant reporting it to the government’s energy authority.” The report, by TechCrunch security editor Zack Whittaker, further says that […]

Critical vulnerability found in Cisco Nexus 9000 switch, update now

Cybersecurity specialists report that the Cisco Nexus 9000 Series switch presents a critical vulnerability that, if exploited, would allow an attacker to remotely connect to a compromised device using Secure Shell (SSH) and control it with root user privileges. The company revealed the existence of this vulnerability in recent days, giving it a severity score […]

Hackers publish videos of Brazilian stripper in Cartoon Network websites

A group of hackers attacked the web site of the children TV channel Cartoon Network, eliminating its normal content and replacing it with images and videos of a renowned Brazilian stripper; according to cybersecurity specialists, this attack was visible in at least 15 different countries. Cartoon Network had to deface its entire websites as well […]

Linux Parrot 4.6, new version of the operating system for pentesters

When we require working with a functional operating system for security analysis and ethical hacking, cybersecurity experts consider that Parrot Linux is, together with BlackArch, one of the best options available, even though there are also Windows-based options. The developers of Parrot Linux have just launched version 4.6 of this operating system, which has some […]

Japan Is Developing First Computer Virus To Prevent Cyber Crimes

Japan is a fascinating country with automated hotels where robots serve guests. There are many technological feats that the country has achieved but still lags behind other countries when it comes to cybersecurity. Last year, many people were shocked when a Japanese minister who heads the cybersecurity department said that he hasn’t used a computer […]

Ransomware attack at Cleveland Hopkins airport in the U.S.

Cybersecurity specialists recently reported a ransomware infection at Cleveland Hopkins International Airport, U.S. Local media mention that malicious software has affected all computers linked to payroll, email and airport records systems. Although the airport attack achieved a very limited scope, experts in cybersecurity believe that this incident could have caused disastrous consequences, especially if the […]

Critical vulnerability in WooCommerce, WordPress plugin

Cybersecurity specialists recommend e-commerce WordPress websites using the WooCommerce plugin to remain alert due to the presence of a critical vulnerability that, if exploited, could allow hackers to take control of trade movements on a compromised website. Plugin Vulnerabilities, a company dedicated to the security of sites in WordPress, was in charge of revealing the […]

Beware! Kodi Addons Come With Malware For Stealing Your Passwords

If you’ve also boarded the cord-cutting bandwagon and are using a pirated streaming device, it’s time to rethink your decision. A report from Digital Citizens’ cybersecurity investigators has revealed that popular piracy apps are ridden with malware that steals your username and passwords and uploads your data without your consent. 12 Million People Are At […]

Beware of 10 Past Ransomware Attacks

One of the biggest malware threats of 2018 was Ransomware, and it continues to disrupt businesses and daily lives of individuals across the world. In 2019 ransomware has taken a new form – security experts believe that researchers have noted thousands of different ransomware variants looming large on the internet. ransomware is becoming more sophisticated […]

This Invisible Malware Is A Nightmare For Your Antivirus Software

There is a constant game of cat and mouse between malware writers and security analysts, and it seems that malware writers are having an edge at the moment. A new breed of malware called “Invisible Malware” has been discovered which is impossible to catch by the currently used security software. How does Invisible Malware Work? […]

Critical vulnerability in jQuery exposes millions of websites

Cybersecurity specialist reports mention that jQuery, the popular JavaScript library, has been compromised by an unusual prototype pollution vulnerability that could allow threat actors to modify a Javascript object prototype. It is estimated that the impact of this problem could be serious, considering that this library is currently used by more than 70% of the […]

Zero-Day vulnerability in Internet Explorer is being used to steal cryptocurrency

A few days ago, a new Internet Explorer zero-day vulnerability was reported, which, if exploited, could allow an attacker to extract information from the compromised machines. Now, cybersecurity specialists from the International Institute of Cyber Security (IICS) report that malicious hackers could exploit this vulnerability to extract cryptocurrency stored on the exposed device. In the […]

List Of World’s Most Hacked Passwords Is Here And It’s Embarrassing

We cannot stress enough on the fact that it is important to use passwords that aren’t easy to guess. Our online security lies in our hands. Keeping a simple and easy to guess password for your online accounts is akin to inviting trouble with arms wide open. A report by the UK’s National Cyber Security […]

All About Preventing DDoS Attack on Enterprise Networks

For any enterprise today, a DDoS (Distributed Denial of Service) attack could mean a real headache. Such an attack could throw out of gear all business activities and all operations of a company. A DDoS attack, which is launched simultaneously from multiple hosts, would exhaust the resources of a network, service or application and access […]

68% of Firms, Moderate to Extremely Vulnerable To Internal Threats

With malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news sites, it is still not the main cause of concern for IT professionals. In a recent survey of IT professionals, 73% of the respondents believe that the main cause for concern is attacks […]

Yet Again! Cyber Attack on Toyota Car Maker

Once again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the two incidents are related. The latest incident, revealed Friday, that a breach has affected its sales offices in Japan, breaching data of up to 3.1 million customers. In February, Toyota’s Australia branch announced […]

EU’s G5 Technology Roll-out In The Age Of Anti-Huawei Publicity

As the world is anticipating with the roll-out of 5G technology, which is promising to change how we deal with the mobile Internet, the intensity of Anti-Huawei propaganda has reached the European Commission. The United States has been pressuring other nations, especially its allies to boycott Huawei products, as it is part of the Chinese […]

Will AI Solve the Gaming Industry’s Cybersecurity Issues?

Over the last few years, several gaming platform-based cyber attacks have come to light. Given the rise in microtransactions and in-game currency that is present in online multiplayer games and triple-A games, a large portion of the gaming community has become a prime target for hackers looking to attain payment details, personal information, and the […]

Fileless Malware, The Archilles Hill Of Traditional Antivirus Software

A typical antivirus products and End Point services today generally speaking comes with two ways of detecting malware: Signature-based Heuristics The signature-based antivirus has evolved since the days of the earliest MS-DOS malware, but still follows the tried-and-tested formula of using sample part of the malware code in order to identify malware infection in the […]

Norsk Hydro Has Fallen Victim To A Serious Ransomware

Ransomware played havoc in 2017, and later in 2019, we all thought that hackers have moved on to crypto jacking, which is a fast and reliable revenue source. Not done, because cybersecurity experts believe that IT managers should still worry about ransomware because attackers are one step ahead. They keep innovating new ways to evade […]

Elements Of A Well Researched Phishing Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money to be earned by collecting personally identifiable information, either sell them to 3rd parties or use it for extortion and blackmail, especially if the victims […]