With evolving technologies and the fast-changing world, new cyber security challenges arise. Many of today’s cybersecurity problems still to be fixed, and certainly, there are some constants. Ransomware has been a major cybersecurity issue for years, but shows no signs of going away as cyber criminals continue to evolve their attacks. Unfortunately, a significant numbers […]
Cybersecurity researchers detail some of the security flaws that are most associated with attacks in recent times. One of the most popular security vulnerabilities among cyber criminals during the past few months is a software security flawin Microsoft Office, CVE-2017-11882, first disclosed in 2017. These flaws continue to be exploited because, despite a longstanding available security update, […]
Highly skilled cyber attackers are using a never-before-seen technique to hide their malicious activities and compromise victims with trojan malware backdoors. Thisintelligence gathering and espionage campaign has been detailed by cybersecurity researchers at Symantec. The researchers found that attackers can spend more than 18 months inside the victims networks, all while taking steps to ensure their […]
Newly discovered cyber security threat, a cross-platform piece of malware called ‘Chaos’ is spreading on Linux and Windows systems to carry out distributed denial of service (DDoS) attacks. These attacks target online gaming firms, crypto exchanges, and rival ‘stressor’ sites renting DDoS-as-a-service. The malware, which was written in Go – Google’s popular cloud and systems programming […]
Microsoft Warns: Hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers, that in reality lead to malware attacks. According to threat analysts from Microsoft’s advanced persistent threat (APT) research group, a phishing hacking crew, linked to North Korea’s armed forces, has […]
Cyber crime is on the rise, and cyber criminals are exploring new ways of conducting distributed denial of service (DDoS) attacks. Making them harder to protect against and more effective at causing disruption. DDoS attacks are a relatively simple, but potent, form of cyberattack in which cyber criminals overload services with web traffic, slowing them down […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Our mobile devices are now the keys to our communication, finances, and social lives, making them lucrative targets for cybercriminals. Whether you use a Google Android or Apple iOS smartphone, threat actors are constantly evolving their tactics to break into them. This includes everything from basic spam and malicious links sent over social media to malware […]