Discover The system is shutting down. There is no way of stopping it, and now your software has been attacked, hacked, and manipulated in a way that is just too late. Hackers are attacking through the software supply chain, and cloud security is now considered as a top priority. Although cloud-computing services are viewed as […]
Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The issue is that bad actors have started using Excel sheets and macros as a new way to deliver malware. Tal Leibovich, head of threat research at Deep Instinct, which is a cybersecurity company specializing in endpoint […]
Security vulnerabilities in millions of Internet of Things (IoT) devices, including connected security cameras, smart baby monitors and other digital video recording equipment, could allow cyber attackers to compromise devices remotely, allowing them to watch and listen to live feeds, as well as compromise credentials to prepare the ground for further attacks. The vulnerabilities in IoT devices that use […]
Ransomware is a growing threat to every organization on the planet and cyber-criminals are innovating at a phenomenal pace because they have the funds to do so. In fact, many cyber-criminal groups have more funds than most enterprises and as the money increases attackers have more to invest in adding resources and people to enhance their threats. Hackers are becoming increasingly sophisticated […]
PunkSpider is scanning every website in the world to find and then publicly release their exploitable flaws all at the same time in the name of making the web more secure. PunkSpider automatically identifies hackable vulnerabilities in websites, and then allows anyone to search those results to find sites susceptible to everything from defacement to data […]