Since many businesses use the Windows platform, incorporating the O365 applications, including emails, is an excellent move for each organization in managing their data and communication services. Not only is it a cost-effective move, but this also promises ease on the production system and organizing information throughout the infrastructure. Having this application or subscription in...Continue Reading
Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...Continue Reading
Cybersecurity experts from a renowned Threat Intelligence team had recently spotted the new cybergang REvil (also known as Sodinokibi) activity after it exposed itself while trying to put their paws on the Point of Sale or POS systems on one of its targeted victims. The targeted business was said to be a healthcare organization that...Continue Reading
Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...Continue Reading
End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...Continue Reading
Android Strandhogg is a Norwegian term referring to mistreatment by Vikings; now, it is a malware term. It was back in 2017 when the malware was first seen as an exploit in Android’s multitasking system. The malware allows malicious apps to masquerade as virtually any other Apps present on the targeted device. The base of...Continue Reading
Cybersecurity experts from a well-known open resource repository for developers – Github, announced that a backdoor malware had infected some of the uploaded projects. The backdoor malware is named Octopus Scanner. Just like this creature, single library code can tangle to multiple developed software as long as malware injects itself into the project. With its...Continue Reading
Recently, detailed information of over 80,000 credit cards discovered is being sold in the Dark web. As per the Security firm that created the leak, cyber-criminals obtained the credit card details from various countries that include the US, France, Australia, and India. These credit cards include both Visa and Mastercard. The country classification is...Continue Reading
A large number of Supercomputers owned by a European supercomputing firm was just taken over by hackers a few days ago. These supercomputers, located in different countries all over Europe, was commissioned by different government agencies and healthcare organizations in cooperation with the National Cyber Security Centre in UK for Covid-19 research and development. According...Continue Reading
A collection of private and sensitive information of more than a thousand members, including staff of the European Parliament was leaked and left exposed in what can only be considered a huge data breach on the European organization’s domain. As reported over the weekend, the leaked data allegedly includes about 1,200 accounts of parliament officials,...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.