Home Search

malware rudra - search results

If you're not happy with the results, please do another search
BotenaGo, malware over encrypted connections

BotenaGo – A New Malware Targeting Millions of IoT Devices

Cybersecurity researchers at AT&T Labs uncovered a new malware variant targeting routers and IoT devices. Tracked as BotenaGo, the malware is leveraging over 30...
Sardonic, BitMart

FIN8 Hackers Found Using Sardonic Malware to Attack Financial Institutions

Information of companies and their staff published on the dark web makes financial companies and their employees a primary target of cybercriminals. Recently, cybersecurity...
Wahab Yusoff

“Best way to handle malware attacks is automation and continuous monitoring”

Wahab Yusoff is a veteran in the information technology industry. The Vice President, Asia, of ForeScout Technologies Inc. has assisted a number of organizations in establishing...
Steganography attack

How to Prevent Steganography Attacks

Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...
DNS attacks

What is DNS Tunneling and How is it Prevented?

Hacker intrusions on organizations’ Domain Name Systems (DNS) have become prevalent in recent times. According to the 2021 Global DNS Threat Report from network security automation...
Data Privacy Week

Data Privacy Week: The 3 Ps Vital to Enhancing Your Online Data Privacy

With cybersecurity awareness being a primary topic for security leaders, Data Privacy Week (January 24-28) is a good time to reflect on the importance of data...

How Illicit Cryptomining Works, And How to Prevent It

Whether it’s a surge in value or a decline, cryptocurrencies always make headlines. In addition to price fluctuations, various crypto-related issues such as cryptomining,...

4 Types of Insiders You Need to Know

Despite several employee awareness programs and cybersecurity best practices, most organizations face insider threats that affect the overall security posture. Threat actors continue to...
Phishing Kits, Cost of Phishing Attacks

How Cybercriminals Use Phishing Kits

Cybercriminals are creating new phishing strategies and malware variants to make their attacks more intense and successful. They even rely on phishing kits, which...
Cross-site scripting attacks

How Cross-Site Scripting Attacks Work and How to Prevent Them

With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....