admin

0 Comments
If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by an unknown hacker or group of hackers, Microsoft confirmed. Earlier this year, hackers managed to breach Microsoft’s customer support portal and access information related to some email accounts registered with the company’s Outlook
0 Comments
Zero trust may seem like just another security buzzword, but organizations are increasingly finding reasons to take the zero trust approach to network security. In the early days of the internet, network security professionals borrowed medieval terminology to describe network defenses: Moats, bastion hosts, perimeters, firewalls and gateways all figured into the network defender’s vocabulary.
0 Comments
Email automation and delivery service Mailgun, announced that it has resolved a security incident that resulted from a massive coordinated attack against WordPress sites. “The mailgun.com webpage began issuing redirects to sites outside of our domain. We immediately launched an incident to determine the source of the redirects and determined that a plugin for WordPress
0 Comments
The new wireless security protocol contains multiple design flaws that hackers could exploit for attacks on Wi-Fi passwords WPA3, a new Wi-Fi security protocol launched in June 2018, suffers from vulnerabilities that make it possible for an adversary to recover the password of a wireless network via “efficient and low cost” attacks, according to a
0 Comments
Yes, you read that right! Russia has fined Facebook with 3,000 rubles, roughly $47, for not complying with the country’s controversial Data Localization law. It’s bizarre and unbelievable, but true. In December last year, Russian Internet watchdog Roskomnadzor sent notifications to Twitter and Facebook asking them to provide information about the location of servers that
0 Comments
Researchers at GreatHorn have identified what they are calling a widespread attack in which attackers spoofed both the Microsoft brand in the display name and the Barracuda Networks brand in the return path and received headers, with the goal of stealing credentials. The team identified an attack notable in that the return path spoofs a
0 Comments
by Paul Ducklin Julian Assange, founder of whistleblowing organisation WikiLeaks (or co-founder, depending on whom you ask) , and arguably Ecuador’s most famous Londoner (or infamous, depending on whom you ask), is in custody following his arrest yesterday. Assange rose to fame by leaking secret government documents that the WikiLeaks organisation acquired from a wide
0 Comments
Matrix—the organization behind an open source project that offers a protocol for secure and decentralized real-time communication—has suffered a massive cyber attack after unknown attackers gained access to the servers hosting its official website and data. Hackers defaced Matrix’s website, and also stole unencrypted private messages, password hashes, access tokens, as well as GPG keys
0 Comments
Disney’s direct-to-consumer streaming strategy took center stage today at the company’s investor day. That strategy includes Hulu (where the recently-closed Fox acquisition has given Disney a contyrolling stake), ESPN+ and the Indian streaming service Hotstar, but executives spent most of their time hyping the upcoming launch of Disney+. The company said the service will launch
0 Comments
Kicking off the second day of the ISC West 2019 conference in Las Vegas, keynote speaker Russ Butler, VP of security for the San Francisco 49ers and Levi’s Stadium, talked about the evolution of the ever-changing stadium security landscape in his talk, “Stadium Security: As It Was, Where It Is and Where It Is Going.” Butler
0 Comments
WikiLeaks founder Julian Assange has been arrested at the Ecuadorian Embassy in London—that’s almost seven years after he took refuge in the embassy to avoid extradition to Sweden over a sexual assault case. According to a short note released by London’s Metropolitan Police Service, Assange was arrested immediately after the Ecuadorian government today withdraws his
0 Comments
As endpoint threats become more sophisticated and abundant, so does the need for more advanced endpoint security tools. An organization can improve the security of its endpoints — including laptops, desktop PCs, mobile devices and servers in the data center — by using software that can rapidly detect, analyze, block and contain in-progress attacks. These
0 Comments
Advances in machine learning and artificial intelligence (AI) are driving investments from the Department of Homeland Security (DHS) science and technology directorate (S&T) with the goal of enhancing security and resiliency in public safety, transportation and communications, according to William N. Bryan, acting under secretary of S&T, who delivered the opening-day keynote speech at the
0 Comments
Cyber threats sometimes feel unrelenting and are becoming more dangerous every day. While the internet presents users with lots of information and services, it also includes several risks. Cyberattacks are increasing in sophistication and volume, with many cybercriminals using a combination of different types of attacks to accomplish a single goal. Though the list of
0 Comments
Cybersecurity researchers yesterday unveiled the existence of a highly sophisticated spyware framework that has been in operation for at least last 5 years—but remained undetected until recently. Dubbed TajMahal by researchers at Kaspersky Lab, the APT framework is a high-tech modular-based malware toolkit that not only supports a vast number of malicious plugins for distinct
0 Comments
Researchers suspect that a new stealer malware dubbed Baldr, first detected in January, has incorporated three known threat actors, according to Malwarebytes. In today’s blog post, researchers said that Baldr has earned positive reviews on Russian hacking forums for its use of three threat actors: Agressor for distribution, Overdot for sales and promotion and LordOdin for development.