Home Blog Page 22
Every year, during the holiday season, we see major attacks on organizations or critical infrastructure. In Dec. 2020, it was ransomware attacks on health care institutions. And last month, it was the Log4j vulnerability, which has affected myriad applications....
It has become routine for cybercriminals to spread their customized malware via fake mobile applications. Security experts from Minerva Labs recently found threat actors leveraging malicious Telegram applications to distribute customized malware dubbed Purple Fox on targeted devices. “This threat...
Making predictions in cybersecurity or any discipline or field can be quite challenging. First, it is virtually impossible to predict the future – consider the emergence of the pandemic and how that has affected so many different functions, including...
As we roll into the new year, many new vulnerabilities are being uncovered, exposing organizations’ critical digital assets to various cyber risks. It seems Microsoft welcomed the year 2022 with a security issue that prevents its Exchange servers from...
Today’s browsers have an auto-login feature that saves passwords for frequently used online services. While saving passwords in browsers is convenient, it is not a good idea. A new analysis uncovered an info-stealing malware dubbed Redline targeting web browsers...
Whether Lean Six Sigma (LSS), Project Management Professional (PMP®), IT Infrastructure Library (ITIL®), the EC-council’s Certified Chief Information Security Officer (CCISO), or Certified Information Systems Security Professional (CISSP) (the list goes on), the real value of professional certifications comprises...
What will Cybersecurity be like in 2022? It is that time of the year when we think about the year gone by and wonder what is in store for us in the new year. In the first of a...
Security experts uncovered a new malware campaign from BlackTeck, a Chinese cyberespionage APT group. According to a report from NTT Security, the group targeted Japan-based companies via a novel malware variant dubbed Flagpro. “We have observed attack cases using Flagpro...
Blockchain's most significant benefit is that no authority has control over it. The advent of IoT (Internet of Things) has sped up its decentralized ledgers for conducting financial transactions. One of the critical challenges of the IoT world is...
Recently, the popular Vietnamese  crypto trading platform ONUS sustained a large-scale cyberattack after threat actors exploited its payment system running on a vulnerable Log4j version. ONUS provides multiple applications for buying, selling, and managing cryptocurrencies. In an official release, the...