Home Blog Page 45
Why does it seem that some of the most important things in life are often those that are the most overlooked? For example, a Personnel Security Program is a vital part of any organization, but personnel security is often...
Indian Computer Emergency Response Team (CERT-In) released an advisory related to a new malware called Drinik. The Android malware targets Indian Bank customers through a hacking process using Phishing emails to steal sensitive user data. Detailing the process, the advisory describes...
On June 3, 2021, American media company Cox Media Group (CMG) experienced a cyberattack in which the malicious threat actor encrypted the network servers and forced the systems to go offline. In the initial investigation, the company did not mention...
APT28, a threat group attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, is targeting Google users through a phishing attack to steal their data and extort money. Google has identified...
Network security and threats are of primary concern during the ongoing pandemic and are increasingly becoming sophisticated and complex. No home or corporate network is safe from cyberthreat or intrusion. Modern-day cybercriminals devise new and complex strategies to launch...
Computer Forensics is now known as Digital Forensics and the task of uncovering digital evidence is more challenging than ever. It now involves governments and multiple jurisdictions. Today, forensic experts would need to travel to different countries to find...
Ever since cybercriminal activities surged globally, the U.S. government initiated multiple cybersecurity measures to enhance security and defend against cyberattacks. Deputy Attorney General Lisa O. Monaco recently announced the launch of the Civil Cyber-Fraud Initiative, which will combine the...
The increase in remote workforce encouraged several organizations across the globe to embrace the Bring Your Own Devices (BYODs) concept. However, using personal devices for official work also brought in various kinds of data security and privacy risks, as...
For organizations of all sizes across the globe, 2020 and 2021 were undoubtedly unprecedented years in many ways. Companies were forced to adopt remote workforce, digitalizing all operations. Notably, the rise of cybercriminal activities leveraging the pandemic made organizations...
A torrent link to a 125GB file with source code and business data of the video streaming platform Twitch has been leaked and published on the 4chan discussion board. An unknown hacker, who premeditated the attack, permeated the streaming platform...